The impact of undergraduate research experiences on students' academic development and retention in STEM fields is significant. Students' success in STEM fields is based on developing strong research and critical thinking skills that make it essential for students to engage in research activities throughout their academic programs. This work evaluates the effectiveness of undergraduate research experiences with respect to its influence on student retention and academic development. The cases presented are based on years of experience implementing undergraduate research programs in various STEM fields at Colorado State University Pueblo (CSU Pueblo) funded by HSI STEM Grants. The study seeks to establish a correlation between students' retention rates and academic development and students' involvement in undergraduate research experiences and programs during their academic journey. The work also delves into different mentoring approaches, including group-based and mentoring by individual faculty. This study provides the engineering and STEM education community with a deeper understanding of the advantages of undergraduate research experiences in enriching STEM and mentoring practices that can increase students' participation and mold their academic and professional character.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreDiagnosing heart disease has become a very important topic for researchers specializing in artificial intelligence, because intelligence is involved in most diseases, especially after the Corona pandemic, which forced the world to turn to intelligence. Therefore, the basic idea in this research was to shed light on the diagnosis of heart diseases by relying on deep learning of a pre-trained model (Efficient b3) under the premise of using the electrical signals of the electrocardiogram and resample the signal in order to introduce it to the neural network with only trimming processing operations because it is an electrical signal whose parameters cannot be changed. The data set (China Physiological Signal Challenge -cspsc2018) was ad
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreThe researcher highlighted the general budget in Iraq for the period (2003-2018) facing the challenges of administrative and financial corruption, in addition to the fluctuations in oil prices, the repercussions and many problems suffered and will suffer the Iraqi government in the process of preparing the general budget of the state and weak contribution of the agricultural and industrial sectors and other economic sectors and neglect altogether, oil has become the main supplier in funding Iraq's budget after 2003, and the impact on the unemployment rates in Iraq, which recorded fluctuating rates and then increased during the period (2012-2018) to achieve this, an inductive method was adopted, using theoretical and descriptive a
... Show MoreThe research aims to get acquainted with the evaluation of the reality of the application of the curriculum axis from among the eight Iraqi academic accreditation standards in a sample of governmental and private universities and colleges in Iraq and to identify the main and secondary reasons for it as well as to provide proposed mechanisms and procedures to help reduce gaps, If the research problem is represented in the weak availability of the requirements of the curriculum axis in universities and colleges (the study sample) due to the weak documentation and successful implementation of them and interest in them is still below the level of ambition, In order to arrive at scientific facts, the researchers adopted the comparativ
... Show MoreThis study aims to know the extent of the impact of Strategic Leadership as an independent variable in Strategic Learning as a dependent variable to help the senior leadership in Anbar University to take the right decisions to develop Strategic Learning programs in light of the circumstances of the Covid-19 and the sudden decisions adopted by the university to switch to E-learning and to blend. The survey was conducted by distributing a questionnaire that was adopted as a primary tool in data collection from the study sample represented by the university's senior leaders, An intentional random sample of (105) was selected from our community of (127), the data were analyzed by (SPSS) Depe
... Show MoreThe main role of infill drilling is either adding incremental reserves to the already existing one by intersecting newly undrained (virgin) regions or accelerating the production from currently depleted areas. Accelerating reserves from increasing drainage in tight formations can be beneficial considering the time value of money and the cost of additional wells. However, the maximum benefit can be realized when infill wells produce mostly incremental recoveries (recoveries from virgin formations). Therefore, the prediction of incremental and accelerated recovery is crucial in field development planning as it helps in the optimization of infill wells with the assurance of long-term economic sustainabi
Background: Cigarette smoking (CS) is a periodontal disease risk factor, affecting clinical parameters such as bleeding on probing (BOP), plaque index (PI), gingival index (GI) and proinflammatory cytokines level. This study examines the impact electronic cigarette use on proinflammatory cytokines and periodontal parameters. Methods: In this non-randomized study, ninety participants diagnosed with gingivitis were assigned into three groups. examined the effect of oral hygiene instructions on periodontal parameters and inflammatory biomarkers. Thirty CS (n=30) vaping electronic-cigarettes (e-cig) (n=29), and non-smoker (NS) (n=31) was included. Clinical parameters including PI, BOP, and GI were recorded at baseline and after 3 weeks
... Show More