Background: The Covid-19 pandemic changed the world; its most important achievement for education was changing the approach from traditional to virtual education. The present study aimed to investigate the role of virtual education networks on mental health of students including personality, beliefs, scientific, and cultural dimensions, in selected countries.Methods: This was an exploratory and applied study. According to the phenomenology strategy, theoretical saturation occurred after 24 semi-structured and targeted qualitative interviews with teachers from Iran, Iraq, Syria and Lebanon, in 2023. Quantitative data was collected through a researcher-made online questionnaire with 423 participants. Teachers with at least a Bachelor’s degree and five years of teaching experience were selected as the study participants. PLS software version 3 was used to analyze the quantitative data.Results: After analyzing the qualitative interviews, 131 open codes were extracted, and grouped into 22 components and 4 concepts. The results of the quantitative data analysis (factor load) showed the effect of virtual education networks on personality (0.590), beliefs (0.819), scientific (0.564), and cultural (0.815) dimensions which indicate a statistically significant effect. Accordingly, students’ belief is mostly affected by virtual education networks. The subcomponents of duality and moral-social confusion in the belief dimension, changing life and nutrition patterns in the cultural dimension, increasing communication and interpersonal problems in the personality dimension, and boredom and frustration in the scientific dimension were highly effective.Conclusions: The study results showed that virtual education acts like a double-edged sword, with both negative and positive effects on the body and mind of students, which necessitates more careful monitoring.
The objective of this research is to determine the relationship between the performance evaluation process and the training programs for the employees, to identify the extent of the organization's commitment to perform the performance evaluation process for its employees and to use the results of this process in determining the appropriate training programs. Performance evaluation, functional analysis, evaluation method used, dependent variable (training programs) and its dimensions, type of programs, program objectives, program curriculum, And the application of the field research methodology and the questionnaire, which included 146 individuals to know their views and analyz
... Show MoreThe current research aims to identify the effectiveness of a computerized program in developing mathematical skills among the first cycle students in basic education schools in the Sultanate of Oman. The two researchers used the quasi-experimental approach on an intentional sample consisting of (40) male and female students at Al Kawakeb School for Basic Education (1-4). Two of the basic fourth-grade classes and then randomly distributing them into two groups, one is experimental (20) male and female students who followed the computerized interactive program, and the other is (20) male and female students followed the traditional way. On the other hand, its reliability has reached (0.81), and the results of the research have concluded th
... Show MoreThe wide use of pesticides in recent years leads to rapid distribution of these pollutants in the environment (air, water and soil).They were transported by means of air or water to biological ecosystems. They become more toxic through the processes of biological magnification while some of them persist for along period.The aim of this work is to show the negative effect that chemical pesticides causes, and in the same to show their side effect on the environment and health in Iraq. We could conclude that the bad use of these chemicals could cause an urgent impact now or in the future. Governmental offices dealing with these materials should take the right measures to minimize the danger and the misuse of these chemicals by seeking alternat
... Show MoreAbstract: The research covered five chapters: So, the first chapter definition of the research is from the introduction to the research and its importance, as the importance of the research lies in an expression of the reality of e-learning as it is one of the new patterns of the educational process and its role in enhancing communication and interconnectedness between the learners from the students ’point of view Physical Education and Sports Sciences for Girls, University of Baghdad, as for the problem The research was, and through the researcher’s acquaintance with many previous studies, references and sources, and being a student at the College of Physical Education and Sports Sciences - University of
... Show MoreLocalization is an essential demand in wireless sensor networks (WSNs). It relies on several types of measurements. This paper focuses on positioning in 3-D space using time-of-arrival- (TOA-) based distance measurements between the target node and a number of anchor nodes. Central localization is assumed and either RF, acoustic or UWB signals are used for distance measurements. This problem is treated by using iterative gradient descent (GD), and an iterative GD-based algorithm for localization of moving sensors in a WSN has been proposed. To localize a node in 3-D space, at least four anchors are needed. In this work, however, five anchors are used to get better accuracy. In GD localization of a moving sensor, the algo
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More