The significant addition of immersive technologies, Virtual Reality (VR), Augmented Reality(AR) and Mixed Reality(MR) are transforming the domain of design education. Still, finding an equilibrium between these new tools alongside with traditional methods of teaching is a menace which educational institutes needs to solve. This paper proposes a structure that would help the ease with which to include immersive technologies within design education, keeping in mind the solid points of more conventional pedagogical methods. Based on a survey of interior design programs, this research highlights the potential for VR, AR and MR in student engagement, creativity skills and professional practices. The results suggest that adoption of an immersive technology can have a profound impact on education, but implementation at the institutional level must consider infrastructural and pedagogical areas and potential technical challenges. The framework suggested helps educators and administrators with the right steps to make immersive technology a part of their curriculum in order that both traditional methods, as well as new way method are intermingled together. It also serves as a how-to guide for schools interested in revamping their design program to prepare students for the new opportunities of practice in today's changing industry.
The study aims to use the European Excellence Model (EFQM) in assessing the institutional performance of the National Center for Administrative Development and Information Technology in order to determine the gap between the actual reality of the performance of the Center and the standards adopted in the model, in order to know the extent to which the Center seeks to achieve excellence in performance to improve the level of services provided and the adoption of methods Modern and contemporary management in the evaluation of its institutional performance.
The problem of the study was the absence of an institutional performance evaluation system at the centre whereby weaknesses (areas of improvement) and st
... Show MoreRequires economic work finding built institutional paint strategies and policies are formulated general economic and clarity in its stated objectives and the involvement of all economic institutions, political and stakeholders to discuss all the issues of economic, financial, monetary and analyzed for the purpose of renewal energies and determine the duties and responsibilities, leaving full freedom to the private sector in the formation of institutions to carry out his duties economic, and that the institutional structures to create the right climate for the implementation of its economic policies, which would facilitate the task of the private sector, and this h
... Show MoreThe concept of rehabilitation provided an essential richness in the conservation philosophy through sustaining buildings life and adapting them to the contemporary use through a vision which looks at the present and future . In Iraq , the existence of historical buildings and the traditional fabric in the cities required the urban development which enhanced the interests of planning and architectural fields especially the building rehabilitation which requires the architectural intervention , and all that led to elaborate the problem of research which is " The confusion in the concepts of monumental, historical and traditional buildings in Iraq, As well as The insufficient knowledge about rehabilitation and the acts related to it through
... Show MoreVehicular Ad Hoc Networks (VANETs) are integral to Intelligent Transportation Systems (ITS), enabling real-time communication between vehicles and infrastructure to enhance traffic flow, road safety, and passenger experience. However, the open and dynamic nature of VANETs presents significant privacy and security challenges, including data eavesdropping, message manipulation, and unauthorized access. This study addresses these concerns by leveraging advancements in Fog Computing (FC), which offers lowlatency, distributed data processing near-end devices to enhance the resilience and security of VANET communications. The paper comprehensively analyzes the security frameworks for fog-enabled VANETs, introducing a novel taxonomy that c
... Show MoreMigration today is a global problem and is an extraordinary social phenomenon that affects countries around the world. Globalization, demographic shifts, political persecution, wars, armed conflicts, natural and environmental disasters, lack of skills, employment and other reasons in many countries have accelerated global migration rates. It has been observed in recent years that there is a rapid feminization of all forms and stages of migration. Women now make up nearly half of the migrant population around the world, and it appears that women have their own motives for migration in addition to family reunification in escaping Gender discrimination, political violence, and social independence, economic motives and the desire for better opp
... Show MoreThis study aims to answer a significant problem of social sciences and philosophy: How do we construct an institutional reality such as diplomacy with an objective recognizable existence? The study assumes that the ability to build institutional reality is based on our biological capacity, as it takes different forms in all the institutions we construct. The study takes the theory of the American philosopher John Searle as an approach to examining the assumption. The study sums up important findings; cultures, although they share the biological capacity on which they produce institutional realities, differ in the form of the value standards on which the institutional realities are based. The study recommends the need of Arab social resea
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More