Online examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical methods. In order to verify that the design of the questionnaire, has been followed up with two steps of verification. First of all, a approval stage within that , the list of questions examined by the section of specialists in this subject in computer technology and teaching in universities, the feedback received was implemented before proceeding in order in order to this second stage . Second of all, the pilot research has been carried out to check the dependability of the factors . The gathered data has been examined using the Cronbach’s Alpha coefficient dependability test in SPSS 18 software package. This final results demonstrated this all factors are dependable as they acquired a value of 0.9126 and above inside test.
The addition of new reactive sites on the surface area of the inert sand, which are represented by layered double hydroxide nanoparticles, is the primary goal of this work, which aims to transform the sand into a reactive material. Cetyltrimethylammonium bromide (CTAB) surfactant is used in the reaction of calcium extracted from solid waste-chicken eggshells with aluminum prepared from the cheapest coagulant-alum. By separating amoxicillin from wastewater, the performance of coated sand named as "sand coated with (Ca/Al-CTAB)-LDH" was evaluated. Measurements demonstrated that pH of 12 from 8, 9, 10, 11, and 12, CTAB dosage of 0.05 g from 0, 0.03, 0.05, and 0.1 g, ratio of Ca/Al of 2 from 1, 2, 3, and 4, and mass of sand of 1 g/50 mL from
... Show MoreThrough my acquaintance with the literature of Iraqi women, specifically during the first half of the twentieth century, I noticed a lack of interest in this type of literature, which forms part of our literary history. Therefore, I decided to date this literature and extract its output from the stomachs of newspapers and magazines, so that readers can see it and remember the names of the Iraqi poets who defied the difficulties in order to participate in the literary movement and who made their contributions in the field of literature.
The truth is that the forgotten poets of Iraq are many, and I mention them, for example, but not limited to, Wadi’a Al-Shabibi, Wadi’a Taha Najm, Fiyah Abu Qalam, and others. Ibtihaj Atta Amin, Sabi
Background: Candida albicans is a prevalent commensal that can cause severe health problems in humans. One such condition that frequently returns after treatment is oral candidiasis. Aim: the goal of this research is to evaluate the efficiency of 940 nm as a fungicidal on the growth of Candida albicans in vitro. Material and Methods: In vitro samples (fungal swabs) were taken from the oral cavity of 75 patients suffering from oral thrush. Following the process of isolating and identifying Albicans. The samples are divided into four groups:(Group 1): Suspension of C. albicans was put in a solution of saline as a control group. (Group 2): Suspension of C. albicans that had been treated with nystatin. (Group 3): Suspension of C. albica
... Show MoreBackground: Candida albicans is a prevalent commensal that can cause severe health problems in humans. One such condition that frequently returns after treatment is oral candidiasis. Aim: the goal of this research is to evaluate the efficiency of 940 nm as a fungicidal on the growth of Candida albicans in vitro. Material and Methods: In vitro samples (fungal swabs) were taken from the oral cavity of 75 patients suffering from oral thrush. Following the process of isolating and identifying Albicans. The samples are divided into four groups:(Group 1): Suspension of C. albicans was put in a solution of saline as a control group. (Group 2): Suspension of C. albicans that had been treated wit
... Show MoreDue to a party's violation of his obligations or responsibilities indicated in the contract, many engineering projects confront extensive contractual disputes, which in turn need arbitration or other forms of dispute resolution, which negatively impact the project's outcome. Each contract has its terms for dispute resolution. Therefore, this paper aims to study the provisions for dispute resolution according to Iraqi (SBDW) and the JCT (SBC/Q2016) and also to show the extent of the difference between the two contracts in the application of these provisions. The methodology includes a detailed study of the dispute settlement provisions for both contracts with a comparative analysis to identify the differences in the appli
... Show MoreThe operative system of theatrical performance depends on the construction of the scenographic space, as it constitutes the most aesthetic effect of the recipient, and the body of the theatrical discourse that contains the signs of the show, and it comes as an embodiment of the directing vision of the show director, so most of the world directors resorted to attention to the output treatment to establish the scenographic space, and thus it possesses a contrast in The embodiment of the directing vision according to the stylistic and hermeneutical dimension of the director, so the two researchers found the importance of studying the topic, and the study came under the title (Directing Treatments of the Scenographic Space in the Iraqi Theat
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More 
        