Preferred Language
Articles
/
1hdaq44BVTCNdQwCQlbp
E-learning in the Cloud Computing Environment: Features, Architecture, Challenges and Solutions
...Show More Authors

The need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services on the Internet. It is predicted to be the next generation of information technology architecture and offers great potential to enhance productivity and reduce costs. Cloud service providers offer their processing and memory resources to users. By paying for the use of these resources, users can access them for their calculations and processing anytime and anywhere. Cloud computing provides the ability to increase productivity, save information technology resources, and enhance computing power, converting processing power into a tool with constant access capabilities. The use of cloud computing in a system that supports remote education has its own set of characteristics and requires a unique strategy. Students can access a wide variety of instructional engineering materials at any time and from any location, thanks to cloud computing. Additionally, they can share their materials with other community members. The use of cloud computing in e-learning offers several advantages, such as unlimited computing resources, high scalability, and reduced costs associated with e-learning. An improvement in the quality of teaching and learning is achieved through the use of flexible cloud computing, which offers a variety of resources for educators and students. In light of this, the current research presents cloud computing technology as a suitable and superior option for e-learning systems.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Dec 06 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Effects of Vitamin E and Q10 Supplementation against Doxorubicin-Induced Neurotoxicity in Rats
...Show More Authors

View Publication Preview PDF
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Antiplatelts Activity of Vitamin E in Relation to Dose and Duration of Therapy
...Show More Authors

           Vitamin E, having the well known antioxidant activity  through scavenging free radicals Ùˆ it occurs in several  isomeric forms , these isomers have relatively different functions . One of these actions is related to its ability to inhibit platelets aggregation and hence thrombosis. The present study included a total number of apparently healthy  62 males . 11of them served as standard group , treated  with 100 mg aspirin /day for more than one month . Another 31 subjects were randomly grouped into 5 groups that received different daily doses of α – tocopherol : 400 IU , 800 IU and 1200 IU for  2-6 months.The remainder ( 20 ) subjects served

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
International Journal Of Current Medical And Applied Science
Evaluation of Postgraduate Clinical Educational Environment in The Context of Iraqi Medical Education.
...Show More Authors

Background: A carefully planned clinical medical education is critical for the provision of supportive clinical educational environment. The latter will ensure effective teaching, active learning and good attitudes and performance at the bedside. The aim of this study was to evaluate clinical learning environment at AL-Diwaniyah Teaching Hospital. Materials and Methods: A descripitive cross-sectional study involved resident doctors from Internal Medicine and Surgery departments who had six months or more residency training in the respective departments. Data were collected using the Postgraduate Hospital Educational Environment Measure. Data where analyzed using the Statistical Package for Social Sciences version 21.0 and presented us

... Show More
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Time-Cost Trade-off to Manage A Project in a Fuzzy Environment
...Show More Authors

In this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Flexible handover solution for vehicular ad-hoc networks based on software defined networking and fog computing
...Show More Authors

<p>Vehicular ad-hoc networks (VANET) suffer from dynamic network environment and topological instability that caused by high mobility feature and varying vehicles density. Emerging 5G mobile technologies offer new opportunities to design improved VANET architecture for future intelligent transportation system. However, current software defined networking (SDN) based handover schemes face poor handover performance in VANET environment with notable issues in connection establishment and ongoing communication sessions. These poor connectivity and inflexibility challenges appear at high vehicles speed and high data rate services. Therefore, this paper proposes a flexible handover solution for VANET networks by integrating SDN and

... Show More
View Publication
Scopus (14)
Crossref (10)
Scopus Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Features of the actor's performance in the ritual theater (Iraqi theater as a model): علي شخير نفل
...Show More Authors

The features of the actor's performance in the ritual theater are of great importance and chief in theatrical work since the first emergence of the theater, as the features of the performance were embodied in all Iraqi theatrical performances, but they took personal privacy in some ritual performances because of their differences and similarities between the ritual theatrical performance and the ritual show Al-Khalis, who wanted the researcher to know the similarities and differences in the features of the ritual performance and in the theatrical performance, despite the many transformations that occurred in the theater and affected the features of the performance, but it remained an important and attractive link between the recipient, t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
study the effects of the polluted waste water on the environment
...Show More Authors

to study the discribrion and the pollution in the environment in the south of baghdad samples of waste water from industrail units using the mercury in its process also

View Publication Preview PDF
Publication Date
Sun Mar 28 2021
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
A Light Weight Multi-Objective Task Offloading Optimization for Vehicular Fog Computing
...Show More Authors

Most Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mo

... Show More
View Publication
Scopus (13)
Crossref (11)
Scopus Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref