The current study aims to examine the level of problems faced by university students in distance learning, in addition to identify the differences in these problems in terms of the availability of internet services, gender, college, GPA, interactions, academic cohort, and family economic status. The study sample consisted of (3172) students (57.3% females). The researchers developed a questionnaire with (32) items to measure distance learning problems in four areas: Psychological (9 items), academic (10 items), technological (7 items), and study environment (6 items). The responses are scored on a (5) point Likert Scale ranging from 1 (strongly disagree) to 5 (strongly agree). Means, standard deviations, and Multivariate Analysis of Variance (MANOVA) were used to analyze the data. The findings showed that students faced high levels of psychological and academic problems and medium levels of technological and study environmental problems. The findings also indicated statistically significant differences in the levels of all problems based on the availability of internet services. In addition, the sample in scientific colleges manifested higher levels of academic problems, and females showed higher levels of study environmental problems. Statistically significant differences also appeared in all types of problems based on study cohort and family economic status.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe control of water represents the safe key for fair and optimal use to protect water resources due to human activities, including untreated wastewater, which is considered a carrier of a large number of antibiotic-resistant bacterial species. This study aimed to investigate the prevalence of antibiotic-resistance to E. coli in Tigris River by the presence of resistance genes for aminoglycoside(qepA( ,quinolone (gyrA), and sulfa drugs( dfr1 ,dfr17) due to the frequent use of antibiotics and their release into wastewater of hospitals. Samples were collected from three sites on Tigris River: S1( station wastewater in Adhamiya), S2 (station wastewater in Baghdad Medical city hospital), S3 (station wastew
... Show MoreThe purpose of this study was to investigate the effect of six thinking hats on creative thinking among 10th grade female students in Tulkarm district. The sample comprises two sections of 10th grade female students (n=80) in Adawiya secondary School, The two sections were divided into two groups; one as an experimental group which works with six thinking hats, and the second as control group that learns traditionally. Creative thinking exam was used to measure the creative thinking with reliability (0.88).
The results of the study have shown the following:
There were statistically significant differences at (α ≤ 0.05) in the creative thinking among 10th grade female student
... Show Moreالملخص : يهذف البحث التعرف على اثر آنموذج التعلم الخبراتي (لروبين) في مادة الفيزياء والدافعية الإبداعية لدى طلاب المرطة الإعدادية, وذلك بالتحقق من الفرضية الآتية: • لا يوجد فروق ذات دلالة إحصائية عند مستوى (0.05) بین متوسط درجات المجموعة التجريبية التـي درست وفق إستراتيجية التعلم الخبراتي (لروبين) ومتوسط درجات المجموعة الضابطة التي درست وفق الطريقة الاعتيادية في مقیاس الدافعية الابداعية. استخدم الباحثون التص
... Show MoreThe research aims to develop a proposed mechanism for financial reporting on sustainable investment that takes the specificity of these investments.
To achieve this goal, the researcher used (what if scenario) where the future financial statements were prepared for the year 2026, after completion of the sustainable project and operation, as the project requires four years to be completed.
The researcher relied on the results of the researchers collected from various modern sources relevant to the research topic and published on the internet, and the financial data and information obtained to assess the reality of the company's activity and its environmental, social, and economic i
... Show MoreGivers of foreign Audit about Social Responsibility of Profit Organization. The recent time is charcterstically with big economic Organization activities, because there are many transactions between these Organizations and different financial markets development techniques.
This encourgage business men to increase their efforts for investment in these markets. Because the Accounting is in general terms it represents a language of these Unions Activities and translate them in to fact numbers, for that there is need for Accounting recording for certain of these Organizations behavior and their harmonization with their Objectives.
In this respect the Audit function comes to che
... Show MoreThe current research aims to know the measurement of the fifth- secondary stage female students' affliction with the social phobia . The research is confined to General directorate of Education in Baghdad / Al-Karkh/2 / for the academic year 2015-2016 and fifth-secondary stage female students. It has been used descriptive method and exposed theoretical sides and previous studies concerning with the social phobia.The procedures of the research include the application of the social phobia scale on random sample of fifth- secondary stage female students ( both branches scientific and literary). The current study has concluded that the fifth- secondary stage female students have&nbs
... Show MoreTechnical education in Iraq Composed of, a complex system of technical competence and scientific, technical and administrative, which extends to cover large areas of the country and constitute a vicious circle between economic development, social and cultural rights through middle-management on the one hand, and between academic knowledge and political decision-making, which aims to bring such development On the other hand, in the light of that education is the actual technical extension applied to create the idea of complementarily between them. In Iraq, have been distributed institutes and technical colleges to achieve those goals, in addition to realizing the idea of integration between them and community, and integration of t
... Show MoreAbstract The aim of this study is preparing an intellectual map according to the feedback (verbally and writhingly ) in order to learn some skills of floor exercises in the women's artistic gymnastics , In addition to that the aim of this study defines on the impacts of intellectual map according to the feedback approach, and to identify the best group between the three groups study in the learning of skills approach in this study, the researchers used the experimental method, the subject of the study included on students second class in physical education and sport sciences , Baghdad University (2014-2015) , and divided into three groups for teaching skills which was under studied .The species used the specific manner by lot for selection
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More