With the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and solve the problem of accumulation, collection and analysis of data by storing it with large, expanded and automatically interconnected databases between university places and departments to provide services adapted to the desire of demand. This research dealt with a sample from of the academic’s opinions and students. The sample is 319 questionnaires. It concluded that each of the infrastructure, devices, Internet of things, smart classrooms, and administrative database, with the presence of the fifth-generation network and its equipment, have a statistically significant correlation with technical education technology.
This day, we see the Significant role that social media platforms play, it plays a vital role in shaping the Social, political, and economic awareness of individuals. The Iraqi Society, which is experiencing rapid cultural and social transformations, is considered a fertile ground for social media and its influences, whether negative or positive. Research and studies indicate that the negative use of social media will lead to weaking of the sense of belonging and citizenship among members of Iraqi society. This, in turn, threatens moral and educational values, increases feelings of family estrangement, and leads to social isolation. On the contrary, if social is used correctly, it can significantly contribute to enhancing educational values
... Show MoreObjective: The study aimed to determine the effectiveness of preoperative psycho - education al
program on cardiac surgery patients information and their level of stress. And find out the differences
in the Psycho educational
program with regard to patients demographic characteristics such as age and gender.
Methodology Aquazi-experimental study was carried out to determine the effectiveness of
preoperative education program on stress for cardiac surgery patients in Baghdad city from the 28th of
March, 2010 , to 19th of September ,2011.
The preoperative psycho - educational program, as well as the questionnaire was constructed as a tool of
data collection for the purpose of the study. Purposive (non probability) s
Educational and psychological adjustment considered to be one of the effective and serious matters at people dealings and behaviors. Generally, psychological adjustment reflects positively on an individual mental health and their capability to be creative at their field. In contrast to those people who lack this feature. As for educational adjustment, it refers to the compatibility and harmony between an individuals and people around. Thus, these features should be available among students particularly those who stay in students' hostel since they live far from their families. The findings of study revealed that there is Educational and psychological adjustment between male and female. Besides, significant differences were showed
... Show More"The aim of the research is to identify the availability of the dimensions of the research variables represented by organizational symmetry and the quality of work-life at the University of Information and Communications Technology, which is one of the formations of the Ministry of Higher Education and Scientific Research in Baghdad, in addition to knowing the relationship and influence between them. The research relied on the descriptive analytical approach based on peer description. The research was analyzed and the research sample consisted of (148) individuals, the sample was chosen using the comprehensive inventory method, data was obtained by relying on the questionnaire which was prepared from ready-made m
... Show MoreThe study's primary purpose is to explore an appropriate way of monitoring and assessing water depths using the satellite remote sensing technique of the Al Habbaniyah Lake in Iraq. This research studied the experience-conditions (thresholds) of different bands for multi-temporal satellite image data with different satellite image sensors (Landsat 5-TM, and EO1-ALI) for the same region, to recognize regions of water depths. The threshold values are taken that to separate the Al Habbaniyah Lake to the required depths (shallow, deep, and very deep), as a supervised method. A three-dimension feature space plot had used to represent these regions. The relationship of the mean values of the three separated water regions with all TM and A
... Show MoreThe current study aims to investigate the effect of (SWOM) strategy on acquiring the psychological concepts of educational psychology course and its retention among education college students. To do this, a sample of (57) male and female student were intentionally selected from first grade, Kurdish department / college of education / Ibin Rushd of human sciences. The sample distributed on two classes, whereby the experimental group consisted of (28) student were taught according to the (SWOM) strategy while the control group made up of (29) student were taught based on the tradition method. The two researchers designed a scale included (50) item to measure students' achievement. The experiment lasted for ten weeks, SPSS was used
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More