The research aimed to prepare a measure of the importance of enlightenment, academic education, and applied skills for third-stage female students, including teaching methods from their point of view/College of Education and Sports Sciences/University of Baghdad/Al-Jadriyah. The researchers used descriptive description in the comprehensive research procedures, an appropriate methodology in achieving the research objectives, sufficient for interpretations, how important is the academic teacher’s knowledge of teaching methods for student learning, what are the roles that the learners have acquired from the academic teacher. The scale of importance and horror consists of 15 items. The research population includes female students of the third stage/College of Education, Fitness and Sports Sciences, numbering (135) students. Attractive artistic drawings were chosen in proportion to 48%. The researchers concluded that the educational and cognitive importance of the academic teacher for developing applied skills for female students is considered the main focus for learners, especially for third-year female students, as she is the link through which what has been learned at this stage is linked and refined in the next stage of the educational process for female students. The researchers recommend benefiting from the academic teacher for the subject. Teaching methods in holding workshops and lectures for all educational levels, and emphasizing the importance of the subject of teaching methods for learners because it is the jewel that is acquired during the four years of study.
The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreResearch summary
This research discloses the study of the methodology of one of the notables of the followers, which is: (Abi Mijlis Al-Basri), who had a clear impact on many commentators after him, especially in the field of interpretation by impact. This study included two topics:
The first: his biography and scientific
The second: his methodology in the traditional interpretation.
In these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosenso
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreCryptocurrency became an important participant on the financial market as it attracts large investments and interests. With this vibrant setting, the proposed cryptocurrency price prediction tool stands as a pivotal element providing direction to both enthusiasts and investors in a market that presents itself grounded on numerous complexities of digital currency. Employing feature selection enchantment and dynamic trio of ARIMA, LSTM, Linear Regression techniques the tool creates a mosaic for users to analyze data using artificial intelligence towards forecasts in real-time crypto universe. While users navigate the algorithmic labyrinth, they are offered a vast and glittering selection of high-quality cryptocurrencies to select. The
... Show MorePsidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show More