Department of Computer Engineering
Permanent URI for this collection
Browse
Browsing Department of Computer Engineering by Subject "computer engineering"
Now showing 1 - 20 of 41
Results Per Page
Sort Options
Item A COMPARATIVE STUDY OF COMMON CYBER SECURITY POLICIES FOR DIFFERENT ENTERPRISES(2022-02-28) SAMEER, MAHA; MISHRA, ALOKCCyber security represents the essential issue and takes the top priority not only for enterprises of all sizes but also national security. Nowadays, many enterprises invest heavily in cyber security to protect their cyber environments and information and communication technology. Therefore, several enterprises embrace security policies as one of security defense solutions to safeguard from any attacks before the damage is done and negative effect occurs on the business of the enterprise. In this study, significant and common cyber security policies of different enterprises are compared and discussed. These enterprises include health sector, financial sector, educational sector, aviation sector, and e-commerce. The purpose of this study is to build robust and inclusive cyber security in each company and enterprise. The result of this study indicates that there are ten important common security policies should be applied in each enterprise and organization. These policies include privacy policy, data protection policy, data retention policy, information security policy, E-mail security policy, physical security policy, website security policy, cloud security policy, network security policy, and access control policy. Additionally, results of this study show some cyber security policies to be more critical and important from enterprise to enterprise. That difference in priority of these security policıes depend on the nature of information under control enterprises and security needs of enterprises to these security policies.Item A COMPARATIVE STUDY OF NEURAL NETWORK APPROACHES IN NETWORK ANOMALY DETECTION(2022-02-15) Öney, Mehmet Uğur; PEKER, SerhatNetwork intrusion detection is an important research field, and artificial neural net works have become increasingly popular in this subject. Despite this, the research concerning comparison of artificial neural network architectures in the network in trusion detection is a relatively insufficient. To make up for this, this study aims to examine the neural network architectures in network intrusion detection to determine which architecture produces high accuracy and low false positive rate, and what are the effects of the architectural components such as optimization functions, activation functions, the momentum of the learning rate. For this purpose, we have generated 6480 neural networks and, we evaluated them KDD99 dataset and, near-real-time simulation environment. This thesis provides a roadmap to guide future research on network intrusion detection using artificial neural networks.Item A COMPARISON OF IMAGE DETECTION ALGORITHMS YOLO AND FASTER R-CNN IN DIFFERENT CONDITIONS(2022-06-13) ABDULGHANI, ABDULGHANI MAWLOOD A.GHANI; Dalveren, Gonca Gökçe MenekşeIn this thesis, we compare YOLOv4 with YOLOv3 and Faster R-CNN in terms of better object detection in both challenging weather conditions and darkness. Moving objects such pedestrians, cars, buses and motorcycles can be difficult to detect in rainy, foggy and snowy weather conditions or even at night. This study is aimed at evaluating the three modules to determine which perform best in such circumstances, bearing in mind that none of them was initially intended to perform in bad weather conditions or at night. This Study is done by utilizing Tesla P4 GPU, with 12GB RAM. We trained these algorithms with an Open-Image dataset, where YOLOv4 has scored the best results at 40,000 iterations, 72 mAP, and 0.63 Recall. On the other hand, YOLOv3 has scored maximum at 36000 iterations, 65.53 mAP, and 0.54 Recall. Finally, Faster R-CNN scored 36,000 iterations, 51 mAP, and 0.49 Recall. In terms of detection performance evaluation, YOLOv4 performed at 42 FPS, while YOLOv3 was at 37 FPS and Faster R-CNN at 10 FPS in video with 30 FPS. Based on the results, YOLOv4 has performed the best in comparison to YOLOv3 and Faster R-CNN.Item A DATABASE DESIGN METHODOLOGY FOR COMPLEX SYSTEMS(2013-07-14) TOPALLI, Damla; ÇAĞILTAY, NergizThe quality of the software is directly related to addressing the users' needs and their level of satisfaction. To reflect user requirements to the software processes, correct design of the database model provides a critical stage during software development. Database design is a fundamental tool for modeling all the requirements related to users' data. The possible faulty conditions in database design have adverse effects on all of the software development processes. The possible faulty conditions can also cause continuous changes in the software and the desired functionality of the targeted system which may result in user dissatisfaction. In this context, reflecting the user requirements accurately in the database model and understanding of the database model correctly by every stakeholder involved in the software development process is the factor that directly affects the success of the software systems. In this study, a two-stage conceptual data modeling approach is proposed to reduce the level of complexity, to improve the understandability of database models and to improve the quality of the software. This study first describes the proposed two-stage conceptual data modeling. Then the proposed method’s impact on software engineers’ comprehension is also investigated and the results are examined. Results of this study show that, the proposed two-stage conceptual modeling approach improves the understanding level of software engineers and eliminates possible defects in this stage.Item A METHODOLOGICAL APPROACH FOR SERIOUS GAME SOFTWARE DEVELOPMENT: AN APPLICATION FOR LANGUAGE DISORDERS(2012-01-25) ÇAĞATAY, Mehmet; EGE, Pınar; ÇAĞILTAY, NergizThe computer software has been actively used in education area in different ways today. However, for several reasons educational institutions are failing to integrate this software to current educational environments. Educational institutions have been criticized for using technologies similar to the ones used hundred years ago. We believe that, one of the reasons for this failure, integration of educational software technologies into current educational environments, is the complexity of these systems. Hence developing efficient software by addressing the real life problems is a complex process. There are various software development methodologies especially for complex software, with regular and planned development processes. So far, these software development methodologies are appropriate for almost all software, though, in terms of unique needs and developmental process of educational software, they may be inadequate. In other words, development of the educational software process requires some other considerations, such as the domain experts that are not considered during the development process of commercial software projects. In this thesis, a new educational software development methodology by involving the domain experts and their interactions with the end users is recommended. Additionally, this software development methodology is used in a serious game development process that supports the therapy process of children with impaired speech and language. Primarily in this study, the contribution of the serious game on the current therapy sessions is evaluated which is developed by using the proposed educational software development methodology. It is aimed to better address the problems of current therapy sessions by developing the software according to the new methodological approach. In other words, this study is a case study to show how the proposed methodology is applied on the development process of a serious game as well as its impact on current therapy sessions.Item A NEW METHOD FOR SOFTWARE DEFECT PREDICTION BASED ON OPTIMIZED MACHINE LEARNING TECHNIQUES(2022-03-01) HASSEN, SHAHO ISMAEL HASSEN; YAZICI, Ali; MISHRA, AlokIn this thesis a novel and robust heuristic driven neuro-computing model was developed for software defect prediction. Unlike other classical machine learning models, neuro-computing, especially Levenberg Marquardt Neural Network (LM ANN), is considered to be more robust in terms of adaptive learning, which can be vital towards non-linear feature learning and hence defect data. However, similar to the other machine learning models, the likelihood of local minima and convergence could not be avoided due to exceedingly high weight estimation for 17 input features. Considering this fact, this research contributed a novel improved genetic algorithm, say heuristic model was developed to assist ANN for adaptive weight estimation and update during learning. Here, the key purpose of heuristic model was to help LM-ANN gaining superior weight estimation, update and hence learning without undergoing any local minima and convergence problem. This as a result helped the proposed neuro computing model to achieve higher accuracy than the classical neural network over targeted software fault datasets. In addition to the classifier or machine learning improvement, in this research the focus was made on feature engineering as well that helped alleviating any probability of class imbalance, over-fitting and convergence.Item ABSTRACTIVE TEXT SUMMARIZATION USING DEEP LEARNING(2022-01-11) ABBAS, HANAN WAHHAB; YILDIZ, BeytullahThe ability to produce summaries automatically helps to improve knowledge dissemination and retention, as well as efficiency in a variety of fields.There are basically two approaches to summarizing, abstractive and extractive. The abstractive approach is considered more successful as it is the process of creating a brief summary of the source text to capture the main ideas. In this approach, summaries created from the source text may contain new phrases and sentences not included in the original text. The use of attention-based Recurrent Neural Networks encoder-decoder models has been popular for a variety of language-related tasks, including summarization and machine translation. Recently, in the field of machine translation, the Transformer model has proven to be superior to the Recurrent Neural Networks-based model. In this thesis, we propose an improved encoder-decoder Transformer model for text summarization. As a baseline model, we used Long Short-Term Memory with attention, a Recurrent Neural Networks model, for the abstractive text summarization task. Evaluation of this study is performed automatically using the ROUGE score. Experimental results show that the Transformer model provides a better summary and a higher ROUGE score.Item AN ADAPTIVE EDUCATIONAL MODEL FOR FLIPPED CLASSROOM(2017-03-07) Ahmed, Aisha Abdulaali Abdulla; ERYILMAZ, MELTEMThis study aimed to develop a flipped classroom demonstrate utilizing versatile innovations for primary school understudies and identify the individual contrasts among the third-grade basic understudies in the English Language in Libya by a versatile method in flipped learning, and customary training at three levels recalling, comprehension and applying of Bloom's Taxonomy independently. This study attempted to answer the following question: Are there any differences between traditional style of education, flipped learning , and adaptive technique in flipped learning in achievement tests according to Bloom's Taxonomy ( Remembering, Understanding, and Applying) for understudies in the third grade of essential in English ? To accomplish the targets of the review and answer its question, three tests were constructed and afterward ensure its earnestness and steadiness in proper ways, and selected the study sample and divided it randomly into three gatherings:- 1. The experimental group (1) educated by adaptive technique in flipped learning. 2. The control group (1) instructed through customary training. 3. The control group (2) (The trial bunch (2)) instructed by flipped learning. The review presumed that in the pre-test the gatherings were homogeneous; however, in midterm test and post- test, there were contrasts measurably huge for the experimental assembly (1).Item AN EVALUATION OF THE USE OF SOFTWARE ENGINEERING PRACTICES BY COGNITIVE MODELLING RESEARCHERS(2022-02-17) Kurtaran, Furkan; Say, BilgeAs an instance of scientific software, cognitive modelling is used to reveal how brains work in different levels of abstraction. Although there have been studies of software engineering practices in other domains of scientific modelling, cognitive modelling has not been inspected from a software engineering point of view. An international online survey with cognitive modelling researchers has been carried to pinpoint relevant points as well as to see whether there were any self-stated differences between developers and modellers; or between high level cognitive modellers and computational neuroscientists in their software engineering practices. It has been found out that researchers in cognitive modelling, as in other scientific software domains, find frequent changes in teams to be problematic, specifying requirements to be hard, acknowledge the need for documentation and want to improve their software engineering practices. Participants find software engineering practices relevant, but their familiarity and level of use is lower, with the exception of version control and change management deemed both relevant and practiced. There are no significant differences between developers and modellers except for the observation that modellers stating themselves as more appreciative of validation. Similarly, no significant differences have been found between high level cognitive modelling researchers and computational neuroscience researchers on their stated level of use of software engineering practices. However, researchers with larger team sizes use validation and verification more than those in smaller teams or working alone and larger user bases enhance the researchers’ use of issue and bug tracking.Item AN INVESTIGATION OF THE IMPACT OF DIFFERENT DATA CLEANING TECHNIQUES ON METRIC RESULT QUALITY IN MACHINE LEARNING(2022-06-14) ABBAS, Israa Mustafa; TOKER, SacipEnormous growth of data due to e-commerce platforms and online applications has posed a big challenge for data analysis and processing. It is now a frequent practice for e-commerce web sites to enable their customers to write reviews of products that they have purchased. Such reviews provide valuable sources of information on these products. A product review has important data source for sentimental analysis is used in all online product firms. This huge volume of data influence leads to a great challenge. These datasets, however, contain different data’s issues. Typically, different data mining technique used in before deploying data in many cases. Spatially, in supervised machine learning models trained on historical and labelled data to predict unseen data, data that a model has never learned before. In this thesis, we focused on design of experiment study in machine learning too [1]. We applied Ronald Fisher theories [2] regularly to find cause- effect relationship .For carry out this design of experimental study, we chose supervised machine learning classification algorithms with sentimental analysis, it is an approach to natural language processing (NLP).This is a popular way for organizations to determine and categorize opinions about a product, service .It involves the use of data mining, machine learning and artificial intelligence to mine text for sentiment and subjective information [3].This study established with Multinominal Naïve Bays ,Random Forest and Logistic Regression to analysis impact of five experimental groups (duplicate data ,punctuation mark ,stop words, limmatezr, TF-IDF transform ) and compare with one control group (no data cleaning applied). To determine the impact experimental group on three models’ efficiency and classification ratio and explain the interesting observations. A simulation done on 353 projects chosen randomly from Amazon product review dataset from twenty-four different categories . Thus, Dataset was collected from Amazon.com by McAuley and Leskovec [4][5]. After collecting metric dataset, SPSS software used for analyzing. A repeated-measure ANOVA was performed to examine this research question and the descriptive statistics of metric used. Analysis result shows there are different impact for data cleansing on machine learning models performance . data cleaning in same cases impacted positively on Random Forest and negatively in Multinominal Naive Bays and Logistic Regression. In other cases, had no impact at all. In overall, experimental result showed Random Forest classifier more sensitive on data cleaning than Multinominal Naïve Bayes classifier and Logistic Regression classifier ,both algorithms get high classification score in un-cleaned data set. Moreover, the experiment results showed data issues behavior differ in machine learning model. We cannot consider data quality issues as irrelevant data in all machine learning algorithm. Analysis result will be explained in detail on result and discussion chapter 4 and 5.Item ANALYSIS OF FILTERING AND QUANTIZATION PREPROCESSING STEPS IN IMAGE SEGMENTATION(2013-08-14) ÇALAMAN, Seda; KOYUNCU, MuratThere is a series of processes to extract semantic information from an image and one of them is the image segmentation. Image segmentation splits the image into smaller parts (segments) such that each segment has similar features such as similar colors or textures. In this thesis, the effects of preprocessing methods on image segmentation process are analyzed from different perspectives. Firstly, Peer Group Filtering, which is one of the preprocessing methods used before image segmentation, is applied on the images and its effect on image segmentation is analyzed. Peer Group Filtering algorithm is used to eliminate noises and to smooth color changes on images. Secondly, Lloyd’s quantization algorithm, which is another preprocessing method used before image segmentation, is applied and its contribution on image segmentation is investigated. Lloyd’s quantization algorithm reduces the number of colors in images. Finally, two different segmentation algorithms (fast scanning algorithm and JSEG algorithm) are compared using preprocessed images. Natural and synthetic images have been experimentally tested in this study. The results obviously indicate that after Peer Group Filtering preprocessing, segmentation achievement increases while run time of the segmentation decreases. On the other hand, the experiments related with the quantization show that, selected quantization level is very important to get benefit from Lloyd’s quantization algorithm. If correct quantization level is selected, then quantization helps segmentation process.Item ANALYZING THE ADMINISTRATIVE AND STAFF REQUIREMENTS OF E-GOVERNMENT SERVICES AND PRIORITIZING THE DEPLOYMENT WITH MODULAR DESIGN: IRAQI CORRECTION SERVICES CASE STUDY(2022-02-28) Alameri, Mohammed; Bostan, Atila; Akman, İbrahimIraqi Correction Services (ICS) is a department within the Ministry of Justice. Most services are provided through traditional paper and pen system. This system causes delays in service provision time and work over-load on ICS staff which translates into a high cost of service provision. Analysis of the collected data showed the priority should be given to the following services when automating ICS services: Requests of permission for official work, Sharing inmate status information, Rehabilitation services for released inmates, Requests for inmates‟ visits, Legal email services, Informatory services for inmate families, announcement of ICS responsibilities, Controlled and filtered email services between inmates and their families. The results of the analysis also point to the web-based service delivery as the most preferred user interface in automation of the services.Item APPLYING USER-CENTERED DESIGN TO M-LEARNING APPLICATION FOR ATILIM UNIVERSITY LECTURES(2022-02-25) Kartal, Kağan; Ertürk, Korhan LeventToday IT systems can be developed by creating an interaction between human and computer but these systems are not examined enough about usability of the systems. Usability is a term refers to user experience. It is explained by ease of use of a product. A highly usable system provides some benefits for both users and businesses such as efficiency and quality. Also this is related with User-Centered Design and Design-Based Research. User-Centered Design (UCD) is a design process, which focuses on users in development lifecycle who will use the product. The focus area of UCD helps to get exact requirements from users. To make successful UCD process, Design-Based Research methodology is the best, which has a similar lifecycle in process. System Usability Scale (SUS) is a measuring tool to get a scale about usability of a system. It is mentioned as “quick and dirty” yet it is reliable. SUS provides an evaluation of usability of a system by 10 statements and it gives a score over 100. In this study, an M-Learning application was developed with high usability. UCD was integrated with Design-Based Research methodology in development process and the system was evaluated with SUS. As the result of this study, UCD and Design-Based Research methodology was integrated and applied successfully. The M-Learning application, which is developed in this study, is evaluated by users with using SUS and the application got score 90,25 over 100.Item AUDITOR TECHNOLOGY AND PRIVACY CONTROL TO SECURE E-LEARNING INFORMATION ON CLOUD STORAGE(2017-01-07) AL-KHAFAJI, Khalid Muhammad Kareem; ERYILMAZ, MELTEMThe aim of this study, proposal to establish and applying a safe mechanism is: Technique Relationship Protected (TRP), that use a privacy control with the Auditor on the information shared between two of the most important services offered by modern technology, namely the E-learning platforms and service of cloud storage, as a matter of fact these technologies required relevant features in the databases made up of information that need safety. This study aims to shed light on the concept of ensuring privacy to protect information shared between the E-learning system and Cloud platform by proposing a mechanism to preserve the privacy of quite distinctive that supports public scrutiny on the information shared between these important technologies. It is worth mentioning that the study has a tendency to need to pick advantage of looping the signatures to verify the authenticity of the information required to review the validity the information shared encrypted. With our mechanism, entity location on each block in the joint information is unbroken figure of the year investigators, administrative body is able to check the efficiency of the safety of the common information, without retrieving the entire file. The proposed system keep a privacy of auditing mechanism for shared information with cloud keeping-safe. With use AES (Advanced Encryption Standard) for protecting the shared information by applying an encryption mechanism on the information that is being uploaded from its owners. They have been certified by the E-learning system administrators, and the application of a decrypt the encrypted information after user's requested, they trusted users has E-learning system after sponsorship by the owners of the information they need. We have to take advantage of ring autographs to build homomorphism authenticators so that a general verifier has the capacity to audit shared information integrity without retrieving the complete data or access to content. Addition to it cannot recognize who's the signer on file, this means that the power to administrator to reveal the identity of the signer. As well as the presence of additional functions in the work of the Auditor that contribute to the consolidation of this technique relationship protected. This is for the protect and the success of that relationship between the technical services which has become an urgent necessity in the modern technical world that contains a very massive amount of data and information those shared and transmitted daily between branches of our technological world.Item COMPARISON OF QUALITY OF SERVICE (QoS) SUPPORTS IN IPV4 AND IPV6(2015-06-25) AL-FAYYADH, Hayder; KOYUNCU, MuratProviding guaranteed services in the current Internet has become extremely essential to fulfill the requirements of Internet users. With an increase in the number of users and demand for multimedia applications like video streaming, VoIP and video conferencing, larger bandwidth requirement increases drastically since such applications are very sensitive to delay, packet loss, and jitter. However, it is not feasible to provide enough bandwidth to satisfy such a high demand. Quality of Service (QoS) is an important network performance parameter having a significant impact on multimedia applications. IPv6 was designed to improve QoS supported by IPv4, as well as other improvements. In this thesis, we discuss quality of service and various parameters affecting it on the Internet. We compare IPv4 and IPv6 protocols in terms of their performance for multimedia applications. In this scope, various queuing algorithms (First in First Out FIFO, Priority Queuing-PQ, and Weighted Fair Queuing-WFQ), which are typical scheduling algorithms used by routers, are examined to see their effects for multimedia applications in IPv4 and IPv6 environments. In addition, integrated services (IntServ) and differentiated services (DiffServ), which are two important techniques developed to provide QoS on the Internet, are elaborated again in IPv4 and IPv6 environments. For comparisons, a simulation framework based on OPNET Modeler is used for modeling, simulating and analyzing network behaviors. The results obtained from the simulations clearly show that the use of IPv6 with different QoS techniques has better performance in terms of jitter and delay compared to IPv4 protocol.Item COMPARISON OF SCHEDULING USED IN BIG DATA FRAMEWORKS(2022-02-24) Aljumaili, Saif; KARAKAYA, Ziya; YAZICI, AliBig Data applications have grown to become one of the main ingredients in the current information technology sector, providing an opportunity for decision-makers to achieve best outcomes, for instance in commerce and business. However, the speed at which such data gathering occurs varies in storage, management, and processing, in all of which the traditional database systems cannot handle such tasks as massive data collection. Resource management and task scheduling play an essential role in Big Data processing. There are different classifications of schedulers that are based on their different features, effectiveness, performance, and so on. However, in this thesis we classify, compare and investigate the detailed information associated with several schedulers being employed in Big Data frameworks. Moreover, this thesis identifies the weakness and strengths in different use cases of these schedulers. Furthermore, the study examines scenarios for the suitability of use cases so as to determine in which case the individual scheduler has some weakness or useless. Thus, these issues we cover in this thesis are not studied in the existing studies.Item COMPARISON OF VARIOUS TRANSITION MECHANISMS FROM IPv4 TO IPv6(2015-06-25) AL-FAYYADH, Faris; KOYUNCU, MuratIPv4 which is the old version of Internet Protocol has a new successor named IP Next Generation (IPng) or IPv6 developed by IETF. This new version is developed especially to resolve some issues of IPv4 like scalability, performance and reliability. Although new version is ready for usage, it is obvious that it will take years to transit fully from IPv4 to IPv6. We have to use these two versions together for a long time. Therefore, we have to investigate and know transition mechanisms that we can use during transition period to achieve a transition with minimum problem. This thesis analyzes present IP transition techniques. Here an attempt has also been made to make empirical evaluation of the three most generally used transition mechanisms which are Automatic 6to4 Tunneling, Manual 6in4 Tunneling and Dual Stack. The obtained test results are also compared with the results of native IPv6 and native IPv4 environments. Empirical evaluation is based on simulations which are carried out using OPNET simulation framework. The outcomes of the thesis are important for providing an insight for choosing an appropriate transition technique, an idea about network capacity planning and migration.Item DESIGN AND IMPLEMENTATION OF IOT-BASED REFERENCE ARCHITECTURE FOR SMART HOMES(2022-03-10) Bello, Abdussamad; KARAKAYA, ZiyaInteroperability, which is the ability of applications, systems, devices, and services to work together reliably and consistently, is one of the most important problems of current smart home systems. The lack of interoperability and the accompanying technological partitioning (that is, managing different devices in the same environment with different applications) creates a major barrier for smart home developers and resistance to consumer acceptance of IoT products in their home environments. The aim of this study is to create a IoT-based Smart Home Reference Architecture that will manage, monitor, and process the data coming from devices and services in the smart home environment while increasing the interoperability. This study also presents a proof-of-concept solution for the proposed reference architecture using FIWARE components. In conducting this study, we made use of constructive research methodology and the ProSA-RA process to analyze existing works, their underlying issues, and then propose solutions to them. To further bridge the gaps in the smart home ecosystem, it is suggested that smart home developers adopt the reference architecture proposed in this study while developing their architectures, applications, and devices.Item DESIGNING AND DEVELOPING A DIGITAL LIGHT PROCESSING BASED STEREOLITHOGRAPHY 3D PRINTER(2022-01-20) Sahib, Mohammed; Tirkeş, Güzin; Akar, SametThe Digital Light Processing (DLP) 3D printer is a device using Computer-Aided Design (CAD) to produce a 3D model directly from the CAD model, by using the Additive Manufacturing (AM) technology. There are different ways of 3D printing technologies that vary in most aspects such as the material, the methods of forming the sample, the speed and accuracy and many other parameters. Choosing the right way of production depends on the required task so that the material and quality fits the level required. The DLP technology is recognized by its simple structure yet it provides a remarkable range of quality and flexibility. This research suggests a custom build that promises to provide a good production quality. Three types of experiments have been made with different CAD designs to ensure the ability of the designed 3D printer. These experiments have been successfully implemented in terms of surface quality, tiny details and accurate measurements. Furthermore two different tests were made to verify the desirable output results.Item DEVELOPMENT OF ONLINE AVIATION COURSE BASED ON 3D VISUALIZATION MODEL(2022-01-25) Al-JAF, Ahmed; ERYILMAZ, MeltemThe development of smart courses and training known as web-based interactive 3D visual educational environments enable students to increase their competencies and abstract problem-solving capacities and to decrease the memory loads. At the same time, the fact that the environments provide instant feedback, facilitate the successive approach that requires experience, accelerates the training process and provides the best understanding of the subject has led to the preference of them. In this study, a training environment that provides information about the weight and balance of the aircraft was designed by using smart training tools, simulations and technologies accepted as a basic technology for employees who will be aircraft load-master in Iraqi Airways. 3D visualization and E-Learning technologies have been used in the developed educational environment. The averages of the exam results of the training group using 3D visualization and the traditional training group were compared using a t-test to evaluate the effectiveness of the visual application. Three methods were used to measure the satisfaction of the 3D group regarding the visual education method. According to the findings, the visual learning environment designed is much more effective and successful than the traditional education environment. According to the t-test, which shows that the result is statistically significant, the effect size is 8.67%. It is recommended that the Iraqi Airways company be encouraged to adopt and support the visualization of education within their future plans. The study has been beneficial in terms of facilitating education and educator, reinforcing theoretical knowledge, and providing education in a realistic environment with visuals. It is also important because it reduces the possibility of an operational error.
- «
- 1 (current)
- 2
- 3
- »