The communication inspiration formed an essential foundations for contribute the influence individuals and recipients, whether negatively or positively, through the messages that were published and presented in them with multiple themes and viewpoints that covered all parts of the world and all age groups; it is directed to children addressing the various stages of childhood, as it simulates many goals, including what is directed through the digital use of educational data in television production, as it is considered an intellectual and mental bag to deliver ideas and expressive and aesthetic connotations to children, where the songs and cartoons carrying data on education; within adjacent relations and in a mutual direction, both of them support each other to achieve meaning and awareness. So that, the foregoing, the researcher has taken to delving into the folds of this title and its axes in a group of horizons and depth in its contents in terms of content and form; also, the exposure to the system of educational values in education and the age groups of children, as well as a review of the digital use of educational data in children's television programs and the method of technical treatment of them; the research aims to study the subject in its aspects, and from this point of view, the researcher formulated the research problem to launch his study with the following question; what are the technical and digital uses and treatments of education data in television production, and since it aims to reveal the employment of digital employment of educational data in children’s television programmes, the approach was adopted for descriptive (content analysis) being more appropriate to achieve the goals and reach the desired results, among which lies the plurality of contents and educational values in the children’s television program from the production of data that contribute to the establishment of education through digital software to produce an expressive, semantic and aesthetic level.
The integration of arti cial intelligence (AI), whether through devices or software, has become a critical tool in analyzing and evaluating technical performance. AI signi cantly contributes to enhancing athletic performance by enabling accurate data analysis and supporting educators in developing effective training programs and interactive curricula. This study addresses a noticeable gap in the literature regarding the attitudes and inclinations of educators toward AI in physical education and sport sciences—a gap often attributed to limited awareness and lack of access to moderntechnologies.Theprimaryaimofthestudyistoexaminethetendenciesandperceptionsoffemaleinstructorsin physical education and sport sciences toward the use of AI
... Show MoreWireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati
... Show MoreThis paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima
... Show Moren this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t
... Show MoreThis paper describes the use of microcomputer as a laboratory instrument system. The system is focused on three weather variables measurement, are temperature, wind speed, and wind direction. This instrument is a type of data acquisition system; in this paper we deal with the design and implementation of data acquisition system based on personal computer (Pentium) using Industry Standard Architecture (ISA)bus. The design of this system involves mainly a hardware implementation, and the software programs that are used for testing, measuring and control. The system can be used to display the required information that can be transferred and processed from the external field to the system. A visual basic language with Microsoft foundation cl
... Show MoreCredential compromise is one of the most widespread security threats, allowing adversaries to bypass traditional authentication measures and impersonate legitimate users. Traditional intrusion detection systems are often based on network-level or macro-behavioral indicators, which can be easily spoofed by an attacker, thus compromising the effectiveness of those mechanisms. This study presents an improved adaptive intrusion detection system to authenticate user behavior based on micro-digital behavioral profiling. It involves the use of timing of keystrokes, micro-mouse, navigation in the application, and interaction rhythm signatures. The proposed system uses a hybrid model consisting of Long Short-Term Memory (LSTM) sequence predi
... Show More