الناصر، عامر عبد الرزاق عبد المحسن والكبيسي، صلاح الدين عواد كريم. 2018. إمكانية تبني الحوسبة السحابية الهجينة في الجامعات العراقية : دراسة تحليلية باستخدام أنموذج القبول التكنولوجي. مجلة الإدا
Although the events of September 2001 marked the United States' employment of solid forces in its direct comprehensive strategy to counter terrorist organizations and any other challenges to US national security, the United States did not lose sight of the importance of the cultural variable. The cultural variable is the United States' most important instrument of soft power in ensuring its dominance of the international system and promoting its global project. France viewed US soft power as a threat to its own civilizational pattern. Therefore, France considers culture to be an inherent component of its national personality and a cornerstone of its international standing as a major force. Additionally, the US-French political and economic
... Show MoreThe research aims to identify motivated to join the Evening Studies students to the College of Education at the University of Tikrit sections. In addition to knowledge of the differences in the degree of motivation of students according to gender, specialty, educational stage. To achieve the objectives of the research scholar us a measure consisting of (34) paragraph formulated positively, have been applied to a stratified random sample strength (500) students.
The results showed that the degree of motivation was very big on all areas of the college and class, reaching the percentage of response (84.3%), and professional motives came first prize as a percentage of (93.8%), in addition
... Show MoreThis study aimed to reveal the stage for teachers of basic training needs from the perspective of workers in Mafraq Governorate, through a survey of a sample of counselors look at the Ajloun area schools reached (58) counselors.
To achieve the objective of the study was constructed questionnaire where they are finalized (18) items distributed on two dimensions (professional needs, performance requirements) and after confirmation of the validity and reliability have been applied to the sample where the results showed that training needs were high, both on a professional or per formative level .
The results also showed no statistically significant differences in the areas of tool due to gender, educational qualification. The study co
The current research aims to evaluate the appraisal form for Arabic language teachers in light of comprehensive quality standards by designing standards for the competencies of primary school teacher in accordance with comprehensive quality requirements. The researcher adopted the descriptive approach. The research community included the Arabic language supervisors in the Education Directorates of Diyala Provincial and Baghdad. The research sample consisted of (14) supervisors from the Diyala Provincial Department of Education and the First Rusafa Education Directorate in Baghdad Governorate by (8) supervisors and (6) Supervisors respectively specializing in Arabic language. As for the research tool, questionnaire prepared by the researc
... Show Morecurrent research Cares about study patterns of optical and aesthetic values in the halls of occasions (weddings) because of their importance in providing an atmosphere of joy. The problem was through the study of light and its impact on the receiver and found a researcher that interior spaces allocated to the halls inappropriate in terms of functional and aesthetic so necessitated the need to study this phenomenon in order to be addressed through the study of light and its impact on the users of those spaces where research aims to current detection properties patterns optical in the internal spaces of the halls and identify some of the aesthetic values of the lighting for the interior spaces.The search consists of four chapters, the firs
... Show MoreAs we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,
... Show MoreEye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera
... Show MoreShadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.
Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.