The present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This means that problem based learning has positive effect on the learners’ achievement. In the light of the results, a number of conclusions, recommendations and suggestions are put forward.
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreThe pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreThis research sheds light on one of the important and vital topics for the banking sectors (technical requirements for the application of economic intelligence) namely by (Hardware, equipment, communication networks, software, databases). And the dimensions of the strategic success of the banks represented by(Customer satisfaction, customer trust, quality of service, growth) In the three Iraqi private banks, namely(Assyria International Investment, Mansour Investment, International Development Investment and Finance). Its implementation is an urgent necessity in order to improve the quality of its banking services to win the satisfaction of its customers and their confidence and then grow to achieve stra
... Show MoreObjectives: The study aimed to evaluate health behavior, evaluate Health Action Process Approach, determine the effectiveness of the Health Action Process Approach based the application of program on students’ engaging in regular physical exercise.
Methodology: The research design for this study was a quasi-experimental. The study sample included high school male students, the final sample size was(160 ) Non-probability sampling (convenience sample) are chosen, (80) students study group and (80) students control group.
Results: The results show there was no statistically significant difference in the HAPA constructs among family's socioeconomic class groups and less tha
... Show MoreThis study investigated three aims for the extent of effectiveness of the two systems in educational development of educators. To achieve this, statistical analysis was performed between the two groups that consisted of (26) participants of the electronic teaching method and (38) participants who underwent teaching by the conventional electronic lecture. The results indicated the effectiveness of the “electronic teaching method” and the “electronic lecture method” for learning of the participants in educational development. Also, it indicated the level of equivalence from the aspect of effectiveness of the two methods and at a confidence level of (0.05). This study reached several conclusions, recommendations, and suggestio
... Show MoreThe study aimed to identify the effect of Total Quality Management on enhancing competitiveness through the opinions of employees of the front- rows of customer service in local Palestinian banks, the researcher adopted an analytical descriptive method through developing a special questionnaire to accomplish the study’s objectives and answer its questions. The study involved all the Palestinian local banks, with their scattered branches in West Bank. The study sample consisted of 3470 executive employees for banking services out of 4753 employees, in the rate of 73%, and the study sample reached (485) employees who were randomly selected working in the front -rows to provide services in the local Palestinian banks during the ye
... Show More