This paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures. This paper studies the effect of using relatively new technology appearing in classroom today which is real time response system (voting system), that serves as real – time windows into each students understand of concepts. These devices can provide a foundation decision making based on data at scale never before possible as well as increasing students learning and engagement with each other as well with the lecturer, also, another new technology the "Bluetooth broadcasting system" is applied which is one of the moderate technique towards M- learning, this tool is used to transfer audio, video, text, notes, etc to the mobile of the students as well as laptop. The computer based examination, interactive board, and notepad as well as free wire and wireless internet access are used to close the digital divide and increasing technology literacy in all students which was one of the challenges, additional challenges include “social loafing,” characterized by
students who work less diligently than they otherwise might, or who become frustrated by course material or technology and thus less engaged. Finally the other colleague's resistance to the use of technology in learning and its effect on students learning is discussed based on practical situations.
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreVol. 6, Issue 1 (2025)
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreOnline examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth
... Show MoreBackground: The high reactivity of hydrogen peroxide used in bleaching agents have raised important questions on their potential adverse effects on physical properties of restorative materials. The purpose of this in vitro study was to evaluate the effect of in-office bleaching agents on the microhardness of a new Silorane-based restorative material in comparison to methacrylate-based restorative material. Materials and method: Forty specimens of Filtek™ P90 (3M ESPE,USA) and Filtek™ Supreme XT (3M ESPE, USA) of (8mm diameter and 3m height) were prepared. All specimens were polished with Sof-Lex disks (3M ESPE, USA). All samples were rinsed and stored in incubator 37˚C for 24 hours in DDW. Ten sample of each material were subjected to
... Show MoreTrue random number generators are essential components for communications to be conconfidentially secured. In this paper a new method is proposed to generate random sequences of numbers based on the difference of the arrival times of photons detected in a coincidence window between two single-photon counting modules
As cultures are mainly divided into collectivistic and individualistic, members tend to emphasize, through communication, either their position as part of their group or their independence from the group. This emphasis is manifested in using the pragmatic concepts of positive politeness and negative politeness. The present study looks into the reflection of these two cultures in Rockstar’s renowned video game, Red Dead Redemption 2 (2018). It aims at identifying the two cultures as present in the game and showing their significance to its narrative. It fills the gap in the studies of language used within video games as well as its cultural reflections. The study addresses the following question: What are the positive and negative
... Show MoreObjective: Develop a deliberate thinking scale for the setting skill in volleyball for second-year female students in the College of Physical Education and Sports Sciences for Woman. Research methodology: The researchers used the experimental approach, employing a two-group approach (pre-test and post-test), to suit the nature of the research. The research community comprised (65) second-year female students from the College of Physical Education and Sports Sciences for Woman at the University of Baghdad for the academic year 2024-2025. The research sample was randomly selected, with (15) students in Section A, the experimental group, and (15) students in Section B, the control group. This group represented (46%) of the students. Th
... Show MoreObjective: Develop a deliberate thinking scale for the setting skill in volleyball for second-year female students in the College of Physical Education and Sports Sciences for Woman. Research methodology: The researchers used the experimental approach, employing a two-group approach (pre-test and post-test), to suit the nature of the research. The research community comprised (65) second-year female students from the College of Physical Education and Sports Sciences for Woman at the University of Baghdad for the academic year 2024-2025. The research sample was randomly selected, with (15) students in Section A, the experimental group, and (15) students in Section B, the control group. This group represented (46%) of the students. Th
... Show More