The need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services on the Internet. It is predicted to be the next generation of information technology architecture and offers great potential to enhance productivity and reduce costs. Cloud service providers offer their processing and memory resources to users. By paying for the use of these resources, users can access them for their calculations and processing anytime and anywhere. Cloud computing provides the ability to increase productivity, save information technology resources, and enhance computing power, converting processing power into a tool with constant access capabilities. The use of cloud computing in a system that supports remote education has its own set of characteristics and requires a unique strategy. Students can access a wide variety of instructional engineering materials at any time and from any location, thanks to cloud computing. Additionally, they can share their materials with other community members. The use of cloud computing in e-learning offers several advantages, such as unlimited computing resources, high scalability, and reduced costs associated with e-learning. An improvement in the quality of teaching and learning is achieved through the use of flexible cloud computing, which offers a variety of resources for educators and students. In light of this, the current research presents cloud computing technology as a suitable and superior option for e-learning systems.
This study attempts to focus on there lation ship between employment policies andsocietal changesinIraq.Theconstruction ofoperational policyincommunitiesin crisis remains fraught with challenges and risks, especially in countries that have longoutstanding conflict sand crises, it is important in this context to achieve those policy and build the foundations of human security and poverty alleviation, unemployment, to find effective ways to help the community to achieve stability and reduce the risk of renew edorrepeat the cycleofviolence-butthatwouldrequirearadicalrethinking, including rethinking the way evaluating therisksandchallengesand management.And thatsuchaprojectshouldbe based ona clear roadmap, andthevisionsofdevelopmentanda clea
... Show MoreThis research attempted to take advantage of modern techniques in the study of the superstructural phonetic features of spoken text in language using phonetic programs to achieve more accurate and objective results, far from being limited to self-perception and personal judgment, which varies from person to person.
It should be noted that these phonological features (Nabr, waqf, toning) are performance controls that determine the fate of the meaning of the word or sentence, but in the modern era has received little attention and attention, and that little attention to some of them came to study issues related to the composition or style Therefore, we recommend that more attention should be given to the study of
Eat this research study features Technical Ceramics Islamic and Chinese The study of four chapters , such as the first chapter the general framework for research and containing the problem that put the following question: Mamdy effect features art on porcelain Islamic and Chinese ) , and whether there are dimensions of the aesthetic , intellectual and ideological in porcelain Islamic and Chinese with lies the importance of research in the promise of a qualitative study and add a scientific theme features art in porcelain Islamic and China , and the objectives of this study One was in the detection of features technical Ceramics Islamic and Chinese study examined the length of time the ninth century AD , and the tenth century AD , and in
... Show MorePostmodern arguments, formed a critic case of what modernity brought in several levels. Postmodern practice was considered as a proactive case having amorphous concepts and features to what entiled as an intellectual trends postmodern philosophically and intellectually. But, what postmodernism architecture broughts in it essence, was not isolation from the intellectual context and entrepreneurship case, and it was not disconnecting from the intellectual and philosophical era of that period. Lliteratures and philosophical argument precede what (Robert Venturi) and (Charles A Jencks) had brought, albeit it was closer to critics and correction the path of modernity from crystallizing a direction that exceeds modrinity to wh
... Show MoreAbsorption, fluorescence, quantum yield and lifetime of rhodamine 6G in chloroform, methanol and dimethyl sulfoxide were measured. From a comparison of these quantities, with those for solid solutions (solid solutions are obtained by mixing constant volume proportions of dye at a concentration of 1*10-4M/l with different volume proportions from the concentrated solution of polymer in chloroform and dimethyl sulfoxide). The results showed that the addition of polymer to liquid concentrated solutions (1*10-4M/l )of rhodamine 6G dye from expecting [which leading to development active medium for laser dye at high concentration] increase the spectra shift toward high energies, and the luminescence quantum yield but decreasing radiative lifetim
... Show MoreData security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm
... Show MoreDeep learning techniques are applied in many different industries for a variety of purposes. Deep learning-based item detection from aerial or terrestrial photographs has become a significant research area in recent years. The goal of object detection in computer vision is to anticipate the presence of one or more objects, along with their classes and bounding boxes. The YOLO (You Only Look Once) modern object detector can detect things in real-time with accuracy and speed. A neural network from the YOLO family of computer vision models makes one-time predictions about the locations of bounding rectangles and classification probabilities for an image. In layman's terms, it is a technique for instantly identifying and recognizing
... Show More