With the increasing integration of computers and smartphones into our daily lives, in addition to the numerous benefits it offers over traditional paper-based methods of conducting affairs, it has become necessary to incorporate one of the most essential facilities into this integration; namely: colleges. The traditional approach for conducting affairs in colleges is mostly paper-based, which only increases time and workload and is relatively decentralized. This project provides educational and management services for the university environment, targeting the staff, the student body, and the lecturers, on two of the most used platforms: smartphones and reliable web applications by cloud hosting. The services include project management, attendance marking, various notifications and alerts, files and resources, a grading system, and an assignment management system. This paper also aims to ultimately digitalize most of the information inside the college which is a great challenge. The proposed system defines five actors, namely: an admin; who is the person with the highest authority within the system, the head of the department, the department coordinator, the project coordinator, the lecturers, and the students. Each of those actors has its privileges and the interaction among participants via the cloud. The mobile platform targets the students exclusively and interacts with the web platform. Finally, this paper stresses the benefits of the proposed system and gives the avenues for future development.
Objective: To assess the fear of laboring women regarding the delivery on themselves and their
newborns.
Methodology : A descriptive study was conducted on (100) pregnant women who where admitted to
labor room in Al- Yarmock Teaching Hospital/Maternity Units, Fatima Al- Zahra and Ibn-Al Baladi
Maternity and Pediatric Hospital. The questionnaire was consisted of pregnant women
socio-demographic data, reproductive data and fear items of labor. Data were collected by using a
questionnaire format, through interview technique and reviewing pregnant records, descriptive and
inferential statistical procedure were used to analyze the data.
Results: The main results of the study revealed a high mean of scores with moderate
This research including, CO3O4 was prepared by the chemical spry pyrolysis, deposited film acceptable to assess film properties and applications as photodetector devise, studying the optical and optoelectronics properties of Cobalt Oxide and effect of different doping ratios with Br (2, 5, 8)%. the optical energy gap for direct transition were evaluated and it decreases as the percentage Br increase, Hall measurements showed that all the films are p-type, the current–voltage characteristic of Br:CO3O4 /Si Heterojunction show change forward current at dark varies with applied voltage, high spectral response, specific detectivity and quantum efficiency of CO3O4 /Si detector with 8% of Br ,was deliberate, extreme value with 673nm.
... Show MoreIn this paper we estimate the coefficients and scale parameter in linear regression model depending on the residuals are of type 1 of extreme value distribution for the largest values . This can be regard as an improvement for the studies with the smallest values . We study two estimation methods ( OLS & MLE ) where we resort to Newton – Raphson (NR) and Fisher Scoring methods to get MLE estimate because the difficulty of using the usual approach with MLE . The relative efficiency criterion is considered beside to the statistical inference procedures for the extreme value regression model of type 1 for largest values . Confidence interval , hypothesis testing for both scale parameter and regression coefficients
... Show MoreBy use the notions pre-g-closedness and pre-g-openness we have generalized a class of separation axioms in topological spaces. In particular, we presented in this paper new types of regulαrities, which we named ρgregulαrity and Sρgregulαrity. Many results and properties of both types have been investigated and have illustrated by examples.
In this work the concept of semi-generalized regular topological space was introduced and studied via semi generalized open sets. Many properties and results was investigated and studied, also it was shown that the quotient space of semi-generalized regular topological space is not, in general semi-generalizedspace.
Introduction: Carrier-based gutta-percha is an effective method of root canal obturation creating a 3-dimensional filling; however, retrieval of the plastic carrier is relatively difficult, particularly with smaller sizes. The purpose of this study was to develop composite carriers consisting of polyethylene (PE), hydroxyapatite (HA), and strontium oxide (SrO) for carrier-based root canal obturation. Methods: Composite fibers of HA, PE, and SrO were fabricated in the shape of a carrier for delivering gutta-percha (GP) using a melt-extrusion process. The fibers were characterized using infrared spectroscopy and the thermal properties determined using differential scanning calorimetry. The elastic modulus and tensile strength tests were dete
... Show MoreThe study aims to identify the uses and the impact of social networking applications and websites on stock markets and their role in defining the details of dealing with stock movement and trading. The study also aims to highlight the role of these networks by increasing confidence in stock markets and companies as well as encouraging and inciting young people to invest in these markets, the study belongs to the descriptive analytical approach, the study population consisted of all current and potential investors in the stock and financial markets in the United Arab Emirates. The study used a questionnaire that was distributed to a number of followers of social networking pages and websites that deal with trading
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More