In the spreading of the Internet, mobile smart devices, and interactive websites such as YouTube, the educational video becomes more widespread and deliberative among users. The reasons for its spread are the prevalence of technologies, cheap cost, and easy to use. However, these products often lack to the distinction in video production. By following videos of an educational channel on YouTube, some comments found to discuss the lack of the content presented to motivate the learners, which lead to reduce the viewers of the videos. Therefore, there is an important decision to find general standards for the design and production of educational videos. A list of standards has been drawn up to help those interested in producing educational videos to stimulate learner motivation, after reviewing 65 documents related to the field of educational video design and multimedia. The list contained three main fields: educational, authentication, and technical. The educational field contained the following standards: (Work Title, Goals, Content Presentation, Content Elements, and Motivational Activities). While the authentication field contained the following standards: (Intellectual Rights and Personality Traits). Finally, the technical field contained the following standards: (Shooting Footage, Lighting, Sound, Texts, final product, and Time/Duration).
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreAbstract
The aim of the current research is to identify the level of administrative applications of expert systems in educational leadership departments in light of the systems approach. To achieve the objectives of the research, the descriptive-analytical and survey method was adopted. The results showed that the level of availability of the knowledge base for expert systems in educational leadership departments (as inputs) was low. The level of availability of resources and software for expert systems in educational leadership departments (as transformational processes) came to be low, as well as the level of availability of the user interface for expert systems in educational leadership departments (as outputs
... Show MoreThe research aims to reveal the professional self and the school climate among the educational counselors. The research problem is crystallized in the following:
1-Identifying the professional level of the educational counselors.
2- Knowing the level of the school climate with the educational counselors.
3- Are there statistically significant differences in the professional self and the school climate between the educational counselors of different gender (male / female)?
4- Is there a relationship between the professional self and the school climate of the research sample?
To answer these questions, the research was conducted on educational counselors in secondary schools in the district of Falluj
... Show MoreThe research specified with study the relation between the market share for the sample research banks and the amount of the achieved revenues from the investment, where the dominated belief that there potentiality enhancing the revenue on investment with the increase of the banks shares in their markets after their success in achieving rates of successive growth in their sales of sales and to a suitable achieve market coverage for their products and they have dissemination and suitable promotion activity, the market share represented the competition for the banks, and the markets pay attention to the market share as a strategic objective and to maintain them also increasi
... Show MoreThe study aims to determine the responsibility of nursing staff for medical errors that accompany the surgery at the hospital , which is one of the important issues that the importance of determining the responsibility of landlords nursing medical errors in the hospital was the rationale in choosing the subject. Since study included cases of errors nursing staff of (22) case. While the checklist distributed to a sample of nursing Angel Group in Sadr Teaching Hospital 's (100) nurs According to the problem, the study in determining the responsibility of nursing staff for medical errors that are not important for the hospitals. Has shown results of the study agreement members of the study sample that the clarity of the power posses
... Show MoreBlockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,
... Show MoreMachine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To
... Show More
This research worked on identifying the effect of increasing the volume of indebtedness by companies listed on the Iraq Stock Exchange on the trading volume of those companies, and this research included some theoretical concepts related to both debt financing and trading volume, and it represents the research community of the joint-stock companies listed in The Iraq Stock Exchange (the banking sector). As for the research sample, it was deliberately chosen represented by companies with continuous trading without stopping, which reached 10 joint-stock companies, and the period of research was extended during the period 2011-2015, and a set of indicators and financial methods were used In measuring research v
... Show MoreThe importance of television has emerged as an effective and influential force in the lives of societies and peoples, And not just a professional media since the fifties of the twentieth century, It was used as a platform to achieve the goals and objectives of the media and politics for governments, agencies and individuals in different countries of the world, Using many methods, methods and techniques that later became important major subjects and curricula and a scientific specialization that was founded for him to study and teach in most international universities, The media, especially television and satellite channels, play an active and significant role in managing crises and conflicts and directing them through the methods of deal
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show More