Preferred Language
Articles
/
sxcnBo4BVTCNdQwCLS-R
Utilizing the ATM technology in e-distance learning
...Show More Authors

<p>There is an Increasing demand for the education in the field of E-learning specially the higher education, and to keep contiuity between the user and the course director in any place and time. This research presents a proposed and simulation multimedia network design for distance learning utilizing ATM technique. The propsed framework determines the principle of ATM technology and shows how multimedia can be integrated within E- learning conteext. The first part of this research presents a theoretical design for the Electricity Department, university of technology. The purpose is to illustrate the usage of the ATM and Multimedia in distance learning process. In addition, this research composes two entities: Software entity by using image, sound and a mix between them to be transfered across the ATM network.. The MATLAB was used to validate the implementation of the required design objectives: (hardware entity) where a prototype is designed (experimental trial) , which aims to carry out the connectivity process between the user and course director, where multiple PCs are connected via unshielded twisted pair (UTP) and a web camera with microphone have been attached to PCs. To finalize this stage, an interface is implemented to show the data transmission process for multimedia by the ATM network and it has been realized through the Visual Basic language. Finally, to validate the level of success by using the ATM technique, some important factors have been determined through the analysis phase, which are: time delay, throughput and efficiency. The propsed design manages to minimize the impat of noise and improve the throuput ratio by 30% while minizing the delay with a ratio of 22%.</p>

Scopus Crossref
View Publication
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Education College Wasit University
“They’ve damaged your uniqueness”: Technology as a Source of Dystopia in Caryl Churchill’s A Number
...Show More Authors

This study focuses on the impact of technology on creating a dystopian world as presented by the English playwright Caryl Churchill in her play A Number (2002). This dramatic work came as a reaction to the most crucial and valuable turning point in the scientific achievements of human engineering, namely, the cloning of the sheep called Dolly. Therefore, A Number is a play that presents an analytical stage for imagining the biotechnological and scientific future. This dramatic vignette captures the playwright’s fears towards the abnormal progress of technology and science and how far such technological progress affects human relationships and identity. It also portrays how technological progress results in the feeling of a lack of

... Show More
View Publication
Crossref
Publication Date
Mon Sep 15 2025
Journal Name
University Of Anbar Sport And Physical Education Sciences
The Impact of the Concept Maps Strategy in the Guided Discovery Method at Learning the Skill of Layup Shooting of Basketball
...Show More Authors

View Publication
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Building and legalizing a test for evaluating the tactical learning of the footwork for the foil fencer in the fencing game
...Show More Authors

AA wahid, journal mustansiriyah of sports science, 2023

View Publication
Publication Date
Sat Aug 10 2024
Journal Name
Cureus
Machine Learning and Vision: Advancing the Frontiers of Diabetic Cataract Management
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Tue Feb 21 2023
Journal Name
مجلة علوم الرياضة
The Effect of using Linear programming and Branching programming by computer in Learning and Retention of movement concatenation (Linkwork) in Parallel bars in Artistic Gymnastics
...Show More Authors

The aim of this study was to Identifying The Effect of using Linear programming and Branching programming by computer in Learning and Retention of movement concatenation(Linkwork) in parallel bars in Artistic Gymnastics. The searchers have used the experimental method. The search subject of this article has been taken (30) male - students in the second class from the College of Physical Education/University of Baghdad divided into three groups; the first group applied linear programming by computer, and the second group has been applicated branching programming by computer, while precision group used traditional method in the college. The researchers concluded the results by using the statistical bag for social sciences (spss) such as both

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the external auditor in assessing the security of information technology systems in light of (ISO/IEC 27001): (Applied research on a sample of private banks)
...Show More Authors

This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Proceedings of Ninth International Congress on Information and Communication Technology
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
View Publication
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Polyacrylamide Polymer Gel Systems for Conformance Control Technology: A Review
...Show More Authors

Low oil extraction and early high water production are caused in part by reservoir heterogeneity. Huge quantities of water production are prevalent issues that happen in older reservoirs. Polyacrylamide polymer gel systems have been frequently employed as plugging agents in heterogeneous reservoirs to regulate water output and increase sweep efficiency. Polyacrylamide polymer gel systems are classified into three classes depending on their composition and application conditions, which are in-situ monomer gel, in-situ polymer gel, and preformed particle gel (PPG).

   This paper gives a comprehensive review of PPG’s status, preparation, and mechanisms. Many sorts of PPGs are categorized, for example, millimeter-sized preformed p

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
2018 Third Scientific Conference Of Electrical Engineering (scee)
A UWB Monopole Antenna Design based RF Energy Harvesting Technology
...Show More Authors

Recently, wireless charging based RF harvesting has interfered our lives [1] significantly through the different applications including biomedical, military, IoT, RF energy harvesting, IT-care, and RFID technologies. Wirelessly powered low energy devices become significantly essential for a wide spectrum of sensing applications [1]. Such devices require for low energy resources from sunlight, mechanical vibration, thermal gradients, convection flows or other forms of harvestable energy [2]. One of the emerging power extraction resources based on passive devices is harvesting radio frequency (RF) signals powers [3]–[5]. Such applications need devices that can be organized in very large numbers, so, making separate node battery impractical.

... Show More
View Publication
Scopus (14)
Crossref (9)
Scopus Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Dar Majdalawi For Publication And Distribution
Technology of architecture and Interior Design, تكنلوجيا العمارة والفضاءات الداخلية
...Show More Authors