International Journal of Emerging Technologies in Learning (iJET),
Год журнала:
2023,
Номер
18(03), С. 22 - 37
Опубликована: Фев. 15, 2023
Identify
the
effect
of
an
educational
design
according
to
repulsive
(allosteric)
learning
model
on
achievement
chemistry
and
lateral
thinking.
The
sample
consisted
(59)
students
from
third-grade
intermediate
students.
They
were
randomly
distributed
into
two
groups
(experimental
control),
equivalence
was
done
in
(chronological
age,
previous
chemistry,
intelligence,
thinking).
(30)
experimental
group
taught
instructional
design,
other
29
(control)
usual
method.
Two
tests
done,
one
them
is
test
items
type
multiple
choice,
a
thinking
(26)
items,
(multiple
choice).
Both
validity
reliability
tools
verified.
results
revealed
superiority
who
studied
by
Wasit Journal of Computer and Mathematics Science,
Год журнала:
2022,
Номер
1(3), С. 1 - 9
Опубликована: Сен. 30, 2022
Vehicular
Ad
hok
Networks
(VANET)
is
an
emerging
technology
with
both
a
bright
future
and
significant
concerns,
particularly
in
terms
of
security.
This
study
focuses
on
three-part
VANET
security
frameworks.
The
first
gives
thorough
review
the
needs,
difficulties,
characteristics
In
order
to
create
secure
architecture
effective
party
communication,
certain
needs
should
be
taken
into
account.
We
provide
information
current
designs
as
well
widely
used
standard
protocols.
second
concentrates
brand-new
categorization
various
assaults
described
literature
remedies
that
go
them.
third
compares
few
these
options
using
established
standards
for
VANET.
Then,
assist
researchers
usage,
we
call
attention
many
outstanding
topics
technological
obstacles
linked
International Journal of Online and Biomedical Engineering (iJOE),
Год журнала:
2023,
Номер
19(04), С. 155 - 173
Опубликована: Апрель 3, 2023
Watermarking
is
widely
used
in
multimedia
preservation
and
communication,
which
comprises,
therefore
not
limited
to,
data
security
validation.
Security,
readability,
imperceptibility,
resilience
are
some
of
the
key
advantages
this
technology.
However,
there
still
certain
issues
that
need
to
be
addressed,
such
as
ability
withstand
a
variety
assaults
without
substantially
affecting
quality
value
embedded
data.
Based
on
its
operational
domain,
watermarking
technology
may
divided
into
two
groups:
spatial
frequency
watermarking.
An
index
mapping-based
approach
for
copyright
protection
multi-media
color
videos
presented
paper.
We
offer
hybrid
discrete
wavelet
transform
cosine
(DCT)
algorithm
digital
video
watermark.
Peak
signal
noise
ratio
(PSNR),
similarity
structure
measure
(SSIM),
have
been
analyze
distortion
produced
by
It
suggested
proposed
method
provides
greater
imperceptibility
conjunction
with
each
other
human
visual
system
it
offers
higher
robustness
against
different
attacks.
International Journal of Engineering Pedagogy (iJEP),
Год журнала:
2024,
Номер
14(1), С. 112 - 128
Опубликована: Янв. 30, 2024
The
need
to
constantly
and
consistently
improve
the
quality
quantity
of
educational
system
is
essential.
E-learning
has
emerged
from
rapid
cycle
change
expansion
new
technologies.
Advances
in
information
technology
have
increased
network
bandwidth,
data
access
speed,
reduced
storage
costs.
In
recent
years,
implementation
cloud
computing
settings
garnered
interest
major
companies,
leading
substantial
investments
this
area.
Cloud
improves
engineering
education
by
providing
an
environment
that
can
be
accessed
anywhere
allowing
resources
on
demand.
a
term
used
describe
provision
hosting
services
Internet.
It
predicted
next
generation
architecture
offers
great
potential
enhance
productivity
reduce
service
providers
offer
their
processing
memory
users.
By
paying
for
use
these
resources,
users
them
calculations
anytime
anywhere.
provides
ability
increase
productivity,
save
power,
converting
power
into
tool
with
constant
capabilities.
supports
remote
its
own
set
characteristics
requires
unique
strategy.
Students
wide
variety
instructional
materials
at
any
time
location,
thanks
computing.
Additionally,
they
share
other
community
members.
e-learning
several
advantages,
such
as
unlimited
high
scalability,
costs
associated
e-learning.
An
improvement
teaching
learning
achieved
through
flexible
computing,
which
educators
students.
light
this,
current
research
presents
suitable
superior
option
systems.
International Journal of Emerging Technologies in Learning (iJET),
Год журнала:
2022,
Номер
17(24), С. 208 - 218
Опубликована: Дек. 20, 2022
The
research
aims
to
find
the
impact
of
a
proposed
strategy
according
Luria
model
on
realistic
thinking
among
fifth-class
scientific
students
and
their
achievement
in
mathematics.
To
achieve
it,
experimental
method
quasi-experimental
design
were
used
for
two
equal
groups,
one
them
is
control
group
taught
traditional
way
other
an
based
model.
community
represents
fifth
class
from
General
Directorate
Education
Karkh
First.
sample
(40)
deliberately
chosen
distributed
equally
between
groups
after
making
sure
that
they
equals
previous
mathematics,
level
intelligence,
chronological
age.
For
purpose
collecting
data
experiment,
2
test
built
both
objective,
i.e.,
multiple
choice;
consisted
(15)
items,
addition
test,
which
its
final
form
(20).
results
indicated
who
studied
outperformed
by
usual
method.
In
light
results,
researcher
recommended
number
recommendations.
International Journal of Emerging Technologies in Learning (iJET),
Год журнала:
2023,
Номер
18(03), С. 110 - 127
Опубликована: Фев. 15, 2023
The
study
of
cooperative
education
is
important
not
only
for
researchers
but
also
those
interested
in
studying
educational
methods,
such
as
university
professors,
teachers
schools,
and
all
institutions.
This
because
its
effectiveness
teaching
students,
developing
their
skills,
ideas
employing
them
the
finding
appropriate
solutions
to
questions
posed
by
teacher.
It
helps
instilling
a
spirit
cooperation
among
students
dividing
into
groups
achieve
desired
goals.
aim
clarify
how
it
use
addressing
educational,
social
psychological
aspects
when
divided
three
sections.
first
section
presents
general
framework
dealing
with
problem,
importance
objectives.
second
deals
concept
education,
date
inception.
discusses
most
theories
that
I
mentioned
about
importance,
results,
foundations
objectives
including
benefits,
characteristics,
stages
strategies.
clarifies
role
teacher
student
e-learning.
third
topic
dealt
methodology
research
presentation
interpretation
discussion.
reached
several
conclusions,
which
are:
staff
institutions
enjoy
high
level
economic
goals,
were
significant
used.
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2023,
Номер
17(06), С. 139 - 155
Опубликована: Март 21, 2023
The
Internet
of
Medical
Things
(IoMT)
faces
stiff
competition
from
the
5th
Generation
(5G)
communication
standard,
which
includes
attributes
like
short
and
long
transmission
ranges,
Device
to
(D2D)
connectivity,
low
latency,
high
node
density.
To
function
in
linked
ecosystem,
IoMT
based
on
5G
is
anticipated
have
a
diversity
energy
mobility.
It
currently
difficult
create
an
routing
system
that
maximizes
efficiency,
lowers
increases
network
lifespan.
"Quality
Services
(QoS)"
5G-based
improved
by
Reliable
Fuzzy-based
Multi-path
shown
this
study.
Whale
Optimization
Algorithm
(WOA)
enhances
protocol
performance.
residual
energy-based
Cluster
Head
(CH)
selection
strategy
rotates
CH
location
among
nodes
with
greater
levels
than
others.
method
chooses
following
set
CHs
for
suitable
applications
considering
initial
energy,
ideal
value
CHs.
According
simulation
results,
our
suggested
technique
QoS
comparison
current
approaches.
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2023,
Номер
17(09), С. 70 - 87
Опубликована: Май 10, 2023
The
subject
of
sentiment
analysis
through
social
media
sites
has
witnessed
significant
development
due
to
the
increasing
reliance
people
on
in
advertising
and
marketing,
especially
after
Corona
pandemic.
There
is
no
doubt
that
prevalence
Arabic
language
makes
it
considered
one
most
important
languages
all
over
world.
Through
human
comments,
can
know
things
if
they
are
positive
or
negative.
But
fact,
comments
many,
takes
work
evaluate
place
product
a
detailed
reading
each
comment.
Therefore,
this
study
applied
deep
learning
approaches
issue
provide
final
results
could
be
utilized
differentiate
between
dataset.
Sentiment
Analysis
was
used
gave
percentage
for
negative
commentary.
This
eight
methods
techniques
using
Fast
Text
as
embedding,
except
Ara
BERT.
These
transformer
(AraBERT),
RNN
(Long
short-term
memory
(LSTM),
Bidirectional
long-short
term
(BI-LSTM),
Gated
recurrent
units
(GRUs),
(BI-GRU)),
CNN
(like
ALEXNET,
proposed
CNN),
ensemble
model
(CNN
with
BI-GRU).
Hotel
Reviews
Dataset
test
models.
paper
obtained
following
results.
In
BERT
model,
accuracy
96.442%.
CNN,
like
Alex
Net
93.78%.
suggested
94.43%.
LSTM
95%.
BI-LSTM
95.11%.
GRU
95.07%.
BI-GRU
95.02%.
94.52%
Ensemble
been
proposed.
Consequently,
AraBERT
outperformed
other
terms
accuracy.
Because
already
trained
some
Wikipedia
entries.
LSTM,
BI-LSTM,
GRU,
BI-GRU,
hand,
had
comparable
outcomes.
Engineering Technology & Applied Science Research,
Год журнала:
2024,
Номер
14(2), С. 13598 - 13603
Опубликована: Апрель 2, 2024
There
are
several
encryption
system
applications
in
5G
networks
where
rapid
response
is
needed,
particularly
the
military,
health
sector,
traffic,
and
vehicular
movement.
This
article
presents
a
proposed
data
security
for
that
fortifies
of
network
through
use
synchronized
chaotic
systems
to
produce
pseudo-random
numbers.
The
technique
by
which
random
numbers
generated
during
procedures
closely
associated
with
security.
Many
used
models
as
bases
wide
variety
data.
In
this
study,
was
carried
out
using
data,
including
two
three-dimensional
color
images
audio
signals
varying
lengths,
addition
Fast
Fourier
Transform
(FFT)
ingredient
energy
wave.
results
revealed
algorithm
deployed
process
performed
well.
Simulations
were
MATLAB.
International Journal of Online and Biomedical Engineering (iJOE),
Год журнала:
2023,
Номер
19(03), С. 99 - 112
Опубликована: Март 14, 2023
Recently,
with
the
requirement
for
protecting
privacy
of
images
transferred
over
internet
and
media
networks.
The
need
to
protect
these
from
hacking
by
unauthorized
persons
manipulation
has
become
very
important
in
this
research,
Block
chain
technology
was
used
its
importance
cybersecurity.
To
maintain
confidentiality
patient's
medical
data,
as
a
result,
solve
problem
requires
increasing
strength
key
encryption
process,
which
is
responsible
ensuring
security
image
.In
paper,
it
proposed
use
block
Data
Encryption
Standard
(DES)
algorithm
purpose
degree
transmitted
enhancing
during
process
encrypting
well
authentication
between
sender
receiver.
Experimental
outcomes
manifested
that
gained
via
suggested
higher,
performing
goal
information
image,
presented
results
obtained
Entropy,
MSE,
PSNR.
International Journal of Online and Biomedical Engineering (iJOE),
Год журнала:
2023,
Номер
19(05), С. 93 - 104
Опубликована: Апрель 27, 2023
saving
the
patient
medical
record
electronically
is
done
via
electronic
records
(EMRs)
where
all
patient-related
information
that
consider
private
and
sensitive
usually
related
to
treatment
process,
as
well
diagnoses
process
of
a
specific
this
needs
be
shared
re-submit
by
many
peers
doctors
with
each,
In
paper,
propose
novel
approach
for
system
using
non-fungible
token
(NFT)
based
on
customized
permission
blockchain
built
secret
sharing
technology
reduce
key
management
overhead
provide
readable
extension
ledger
ensure
it
easy
read
access
from
any
type
computer.
The
uses
NFT
(NFT-EMR)
ensures
guarantees
availability,
privacy,
security
providing
authority
over
his
data
proof
ownership
which
shares
consistency
can
used
in
real-world
between
hospitals
centers
within
metaverse
world.
NFT-ERM
was
evaluated
main
evaluation
factors
evaluate
compared
standard
ERM
system.