Online learning is not a new concept in education, but it has been used extensively since the Covid-19 pandemic and is still in use now. Every student in the world has gone through this learning process from the primary to the college levels, with both teachers and students conducting instruction online (at home). The goal of the current study is to investigate college students’ attitudes towards online learning. To accomplish the goal of the current study, a questionnaire is developed and adjusted before being administered to a sample of 155 students. Additionally, validity and reliability are attained. Some conclusions, recommendations, and suggestions are offered in the end.
Virtual platforms are online classes used in teaching and learning EFL that let both teachers and students connect, communicate and cooperate online in real time. Learners get access to educational possibilities at home easily. Virtual classes can be conducted using a variety of techniques, including video conferencing, Google Meet, Zoom, conversations, reactions, and screen sharing. Users can access these programs on a range of gadgets, including laptops, tablets, and smartphones. The COVID-19 coronavirus pandemic affected all educational institutions, including schools, colleges, and universities. Our Iraqi educational institutions have been switched to use virtual platforms in this pandemic, much as all other foreign institutions
... Show MoreThe problem of job burnout has become one of the main problems for researchers in social welfare organizations (social protection bodies) - one of the formations of the Ministry of Labor and Social Affairs. Its negative effects increased in light of the COVID-19 pandemic, and in light of the Corona pandemic, the pressures and burdens of workers varied, which resulted in high rates of anxiety, tension, and intellectual and physical exhaustion, and then negatively affected their efficiency in performing work at the individual and organizational level, especially after the increasing tasks of these Bodies in carrying out their role in achieving the general goals and objectives as beingThe general goals are that they are responsible for providi
... Show MoreVideo copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show More.
يختلف دور العلاقات العامة (PR) وأهميتها من مجتمع إلى آخر، تبعاً لاختلاف ثقافات هذه المجتمعات عموماً, ولاختلاف القيم الأخلاقية المعمول بها من ممارسيها في منظمات هذه المجتمعات, فالعلاقات العامة في المجتمعات المتقدمة وبعض الدول النامية قد خطت خطوات جبارة ووصلت إلى مرحلة المساهمة في التخطيط الاستراتيجي وعملية اتخاذ القرار, في إطار التزام إداراتها بقيم ومعايير أخلاقية محددة لممارسيها, وبالمقابل نجد أن تطبيقها في
... Show Moreيهدف البحث الحالي الى التعرف إلى درجة تقدير عينة من المديرين في المنظمات العامة لمستوى تطبيق ولتحقيق ، (Covid- نمط القيادة الخدمية من وجهة نظرهم ، وعلاقتها بمؤشر رضا الزبائن في ظل جائحة ( 19 ذلك اتبعت الباحثة المنهج التجريبي بتطبيق استبانة ضمت محورين، الأول: لقياس مستوى القيادة االخدمية وفقا الذي يشمل ( 8) أبعاد هي ( التمكين , الدعم , ( D. Van Dierendonck and I. Nuijten , لمقياس ( 2011 المساءلة, الشجاعة, التسامح , الموثوقية , التواضع , الر
... Show MoreData hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show Moreهدف البحث التعرف على الحسرة الوجودية فضلاً عن التعرف على الفروق في الحسرة الوجودية بين الطلبة على وفق متغير النوع (ذكور-اناث) والتخصص الدراسي (علمي – انساني) والمرحلة الدراسية (أول-رابع)، تألفت عينة البحث من (150) طالبة من طالبات الجامعة -كلية الزراعة وكلية التربية البدنية وعلوم الرياضة، وتم تطبيق مقياس البحث -مقياس (الحسرة الوجودية) وهو (من إعداد الباحثة)، وقد اسفرت نتائج البحث عن: - إن طلبة الجامعة لديهم درجة عال
... Show MoreThe issue of peace, renunciation of violence, and acceptance of the other is one of the vital issues that rose to the top of the list of priorities at the end of the last century and the beginning of the new millennium of the conscience of the Iraqi people by spreading the culture of peace. In this context, we seek during this research to identify the concept of the culture of peace and its impact on sustainable development, and to draw a set of results and suggestions to consolidate this culture in our Iraqi society as an obligation of sustainable development.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show Moreهدفت الدراسة التعرف على الضغوط النفسية والخوف من المستقبل لدى أمهات أطفال طيف التوحد، بلغت عينة الدراسة )60( ام لديهن طفل توحدي، تم استخدام المنهج الوصفي التحليلي وبعد تطبيق مقياسي الدراسة ومعالجة البيانات احصائيا توصلت الدراسة ان األمهات لديهن درجة عالية من الضغوط النفسية ودرجة عالية من الخوف حول مستقبل اطفالهن، وفي ضوء نتائج الدراسة خرجت الباحثة ببعض التوصيات والمقترحات.
<p class="0abstract">Image denoising is a technique for removing unwanted signals called the noise, which coupling with the original signal when transmitting them; to remove the noise from the original signal, many denoising methods are used. In this paper, the Multiwavelet Transform (MWT) is used to denoise the corrupted image by Choosing the HH coefficient for processing based on two different filters Tri-State Median filter and Switching Median filter. With each filter, various rules are used, such as Normal Shrink, Sure Shrink, Visu Shrink, and Bivariate Shrink. The proposed algorithm is applied Salt& pepper noise with different levels for grayscale test images. The quality of the denoised image is evaluated by usi
... Show MoreResults: The results summarized two goals, the first goal stipulates (to identify the degree of cyberbullying among academically outstanding students in the middle school stage). To achieve this goal, the researchers applied the research tool (electronic bullying scale) and then extracted the arithmetic mean for the sample of the current research, which amounted to (6.28) with a standard deviation of (4.03). Then the researchers applied the t-test for one sample to identify the significance of the differences between the means. The arithmetic mean for the sample and the hypothetical (theoretical) mean, which amounted to (11.5) degrees, and after applying the T-test for one sample, it was found that the calculated T-value, which amounted to
... Show MoreThe present study aims to investigate the various request constructions used in Classical Arabic and Modern Arabic language by identifying the differences in their usage in these two different genres. Also, the study attempts to trace the cases of felicitous and infelicitous requests in the Arabic language. Methodologically, the current study employs a web-based corpus tool (Sketch Engine) to analyze different corpora: the first one is Classical Arabic, represented by King Saud University Corpus of Classical Arabic, while the second is The Arabic Web Corpus “arTenTen” representing Modern Arabic. To do so, the study relies on felicity conditions to qualitatively interpret the quantitative data, i.e., following a mixed mode method
... Show MoreWhen talking about Andalusia in the period of time after the handover of the city of Granada, we find many historical issues thatIt deserves to be studied, including the lead plates, those plates about which opinions differed, and they formed a puzzleIt still needs to be explained in many respects.
The current research aims to: 1- Identify the emotional sensitivity of children from the parents' point of view. 2- Identifying the differences in the emotional sensitivity of children from the parents ’point of view, according to the parents’ gender variable (father - mother). The basic research sample consisted of (285) male and female students from the sixth grade (primary school), chosen in a randomized stratified method from the districts (Al-Karkh and AlRasafa). While the sample of statistical analysis amounted to (200) father and (200) mothers of male and female students who were randomly selected from the sixth grade of the education directorates (Al-Karkh and Al-Rasafa). The two researchers also used a number of sta
... Show MoreNEACADEMY's JOURNALS
This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreImage compression is an important tool to reduce the bandwidth and storage
requirements of practical image systems. To reduce the increasing demand of storage
space and transmission time compression techniques are the need of the day. Discrete
time wavelet transforms based image codec using Set Partitioning In Hierarchical
Trees (SPIHT) is implemented in this paper. Mean Square Error (MSE), Peak Signal
to Noise Ratio (PSNR) and Maximum Difference (MD) are used to measure the
picture quality of reconstructed image. MSE and PSNR are the most common picture
quality measures. Different kinds of test images are assessed in this work with
different compression ratios. The results show the high efficiency of SPIHT algori
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
In the framework of this study, the phenomenon of transfer is probed pragma-linguistically and socio-linguistically concerning marriage situations among Iraqi EFL learners. The study also strives to look at the refusal strategies most commonly employed by Iraqi female English as a foreign Language (EFL) learners compared to their counterparts, American native speakers of English. The study involved 70 female participants who answered a Discourse Completion Task (DCT), which contained ten marriage proposals to be refused. Each situation entailed refusal of a person from a higher, an equal, and lower status. The researchers adapted Beebe, Takahashi, and Uliss Weltz’s (1990) taxonomy of refusal for analyzing the data comprehensively.
... Show More