تناول المقال موضوع استثمار الذكاء الاصطناعي في تحليل البيانات الضخمة داخل المؤسسات العلمية، وركز على توضيح أهمية هذا التكامل في تعزيز الأداء الأكاديمي والبحثي. استعرضت المقالة تعريفات كل من الذكاء الاصطناعي والبيانات الضخمة، وأنواع البيانات داخل المؤسسات العلمية، ثم بينت أبرز التطبيقات العملية مثل التنبؤ بأداء الطلبة، والإرشاد الذكي، وتحليل سلوك المستخدمين، والفهرسة التلقائية. كما ناقشت المقالة التحديات الأخلاقية والمهنية، وأكدت على ضرورة تبني رؤية استراتيجية تشمل تدريب الكوادر ودمج هذه التقنيات في السياسات التعليمية. وخُتمت بأمثلة عالمية وعربية – من السعودية، والأردن، والعراق، والإمارات – حول استخدام منصات ذكية في التعليم والبحث، مشيرة إلى دور هذه التقنيات في صياغة مستقبل معرفي قائم على التحليل الذكي واتخاذ القرار المبني على البيانات.
يعد موضوع الشباب- في الوقت الحاضر - من الموضوعات المهمة التي يهتم بها علم النفس والتربية والأجتماع والصحة . بل أن الدول المتقدمة تهتم بشبابها أيمانآ بأن تقدم الأمة لايقوم الاعلى الأمكانيات البشرية من الشباب .
ومما لاشك فيه أن دخول الشباب الى عالم المجتمع الجامعي يطرح عليه وبشدة مشكلة التصرف م
... Show MoreThe aim of the research is to demonstrate of the relation and the influence of the components of economic intelligence (strategic alertness, information security policy, impact policy) in achieving of economic growth (creativity, competitiveness, quality improvement). The questionnaire was used as a main tool for selected sample. Answers analyzed by using the statistical program (SPSS) to calculate the arithmetic mean, standard deviation, weight percentage, correlation, F test, and Squared factor (R2).
The research derived its importance from the distinguished role of information systems in the work of industrial companies, and its impact toward achieving economic growth rates in its various activities. T
... Show MoreThe current research aims to verify the role of strategic intelligence as an explanatory variable in organizational success as a respondent variable in the colleges of the University of Fallujah, the research community. (Dean, Associate Dean, Section Head, Division Officer, Unit Officer), The researcher used the questionnaire as the main tool to collect data that included (50) items, in addition to using personal interviews and field observations as aids in data collection. The researcher relied on statistical programs (SPSS V.25; Excel V (16) In the treatment and analysis of data through the use of the most appropriate statistical methods (arithmetic mean, standard deviation, difference coefficient, determinatio
... Show MoreThe theatrical field has witnessed a huge development that included the semantic and formal sides, considering that the theatrical experience has gone through a long period of description and the dominance of literature and linguistics, thus the theatrical experience has been open to many workings and uses of high quality in forming and composing the visual system. The semiotics had a role in presenting transformed sign forms and features generated in the theatrical space. Thus (costumes, décor, makeup, lighting, and actor) are considered elements with sign forms and attributes that together constitute integrated semiotic unit that include all the layouts in the scenographic space. The two researchers determined on semiotics due to its
... Show MoreАннотация: В данной статье исследуется проблема семантики текстовой парадигмы как одного из активных вопросов языковой науки о тексте, рассматриваются семантические отношения и их роль в раскрытии тех смысловых связей, на основе которых можно отличать типы семантических отношений «синонимия, антонимия, полисемия», выдвигается положение о семантических отношен
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe research aims to identify intelligence spiritual among a sample of students Baghdad University as well as to identify the differences between students in intelligence spiritual according to variable type (male - female), and variable area of study (Science - a human) and variable (First grade - fourth grade), The research sample consisted of (300) students, were applied scale search - a spiritual Intelligence Scale (prepared by the researcher), has resulted in the search results for: -
The students of the University of Baghdad (sample) enjoyed a high level of spiritual intelligence.
- There are no differences between males and females in the spiritual intelligence.
- There
This research seeks to clarify the regulatory and educational role of the regulatory and educational institutions in reducing the phenomenon of financial and administrative corruption as a dangerous phenomenon of the communities, as it touched search kinds of financial and administrative corruption and the causes and effects, as well as to the role of educational institutions in reducing this phenomenon, and finally between experiments some SAIs and accounting Arab and foreign countries on how to reduce the phenomenon of financial and administrative corruption.The research aims to several targets which shed light on the role of educational and supervisory institutions in reducing corruption, a statement origins and evolution of and justi
... Show MoreThere is no doubt that the oud is one of the most important folk musical instruments in Iraq. It has been known since the ages of ancient Iraq in its form, strings, and the way to play it through the clay number. On them, however, they have participated in showing the instrument the greatest potential and musical aesthetics, and the interested person may be wondering about ways to learn to play this instrument, so the training methods varied between personal interpretations on the one hand and systematic teaching in educational institutions on the other hand, especially that they have received the attention of educational institutions Miya, that which must adopt an appropriate and scientific strategy that accompanies global education pro
... Show MoreTourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective
... Show More