In this study, the nanocrystal-ZnS-loaded graphene was synthesized by a facile coprecipitation route. The effect of graphene on the characterization of Zinc Sulphide (ZnS) was investigated. The X-ray Diffraction (XRD) results reveal that ZnS has cubic system while hexagonal structure which is observed by loading graphene during the preparation of ZnS. Energy Dispersive X-ray Spectroscopy (EDS) analysis proved the presence of all expected elements in the prepared materials. Nanosize of fabricated materials has been measured using Scanning Electron Microscopy (SEM) technique. This study also found that the graphene plays a critical role in lowering the optical energy gap of ZnS nanoparticles from 4 eV to 3.2 eV. The characterization of detec
... Show MoreThere is confusion between the concept of honesty and credibility arguing that their meaning is the same. ‘Credibility; is derived from the truth which means evidence of honesty, while ‘honesty’ means not lying and matching reality. The study of credibility begins globally at the end of the fifties of the second millennium to see the decline and refrain from reading newspapers, while it was studied in the Arab world in 1987. Global studies find several meanings of the concept of ‘credibility’ such as accuracy, completeness, transfer facts, impartiality, balance, justice, objectivity, trust, honesty, respect the freedom of individuals and community, and taking into account the traditions and norms.
Credibility has two dimens
Online examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth
... Show MoreThe significance of the social motivation lies in showing the great and important role of the story of the prophet of ( Moser ( Peace upon him) in Quran , especially , it is considered the greatest one in Quran , as that confirmed by the poets of Andalusera ,as it includes aspects similar to that prevailing over in their environments and their social life via the social motivation. Moreover , the relation's poets with the Andalus society where suitability prevailing over consistent with the events of the story; bedsides, artistic expression about the society for being considered as a trust mirror reflect real facts surrounded by the Andalussociety with all its sides and aspects . Thus , the poet takes Quran , especially the story of Mose
... Show Moreهدفت الدراسة الى الاهتمام واستغلال ماهو جديد من تقنيات واجهزة حديثة في تعليم السباحة الحرة عن طريق توجيه الاطفال على تطوير مداركهم واستيعابهم بالتطور التكنولوجي الذي يتناوله العالم ،قامت الباحثتان باعداد منهج تعليمي باستخدام نظارة الواقع الافتراضي وذالك بتوفير بيئة مشابهة للبيئة الحقيقية تحاكي مدارك عقول الاطفال في عالم افتراضي لتتكون صورة كاملة عن مهارات السباحة الحرة ،ومن هنا اتت المشكلة نتيجة تعل
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreVariable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage
... Show MoreThis paper presents a minimum delay congestion control in differentiated Service communication networks. The premium and ordinary passage services based fluid flow theory is used to build the suggested structure in high efficient manage. The established system is capable to adeptly manage both the physical network resource limitations and indefinite time delay related to networking system structure.
Has influenced technology contact on social values in the Arab community in general and
the Iraqi community in particular whether this positive change or a negative effect on the level
of the individual and society is reflected this influence through socialization and human
relations as well as the behavior of individuals and dealing with others, where the world was
to soon pass changes slow, and the amounts that can be measured and trends can be calculated
and the effect of points can be identified and controlled, but the technological changes and
openness cognitive features that seemed evident in the last decade of the twentieth century
brought about a change in all scales and distances traditional considerations.<