Preferred Language
Articles
/
nhilXJYBVTCNdQwCb4MO
Utilizing Machine Learning Techniques to Predict University Students' Digital Competence
...Show More Authors

Given the importance of possessing the digital competence (DC) required by the technological age, whether for teachers or students and even communities and governments, educational institutions in most countries have sought to benefit from modern technologies brought about by the technological revolution in developing learning and teaching and using modern technologies in providing educational services to learners. Since university students will have the doors to work opened in all fields, the research aims to know their level of DC in artificial intelligence (AI) applications and systems utilizing machine learning (ML) techniques. The descriptive approach was used, as the research community consisted of students from the University of Baghdad in its colleges with scientific and human specializations. To measure the level of DC, a questionnaire was applied as a data collection tool to a sample of 400 male and female students, distributed based on gender and academic specialization. The results showed that the sample students did not have high DC. Their possession of DC related to AI applications and systems was to a moderate degree. The results indicated that there were differences in the responses of the study sample members due to the gender variable and the specialization variable, in favor of the female students with scientific specialization.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The Effect of Combining Video Lectures and Kolb Experiential Learning on EFL Student-Teachers’ Ability to Teach Communicative Coursebook and their Teaching Competencies
...Show More Authors

Communicative-based textbooks are developed and disseminated throughout the country.
However, it is difficult for teachers who themselves have learnt English through the traditional
approaches to suddenly be familiar with CLT (Communicative Language Teaching) principles
and teach communicatively. Therefore, many teachers remain somewhat confused about what
exactly CLT is and others familiar with CLT but unable to achieve communicative classroom
teaching. Consequently, those teachers need to be introduced to the CLT principles and they need
training in how to put CLT principles into practice. Accordingly, this study aims to find out the
effect of combining video lectures and Kolb experiential learning on EFL student-t

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Cyber bullying among college students
...Show More Authors

The current research aimed to explore the practicing of cyber bullying among college students as well as the differences of practicing cyber bullying among university students based on gender variable. The finding revealed that there was a high prevalence rate for cyber bullying among research sample who was students from Baghdad University. It assured clearly that this group participated in cyber bullying effectively, due to the biological and psychological factors which make them super sensitive toward the social and economic problems. Moreover, the results showed that there were significant differences between male and female in practicing cyber bullying. The study proved that women use cyber bulling more than men.  

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Achieving Goals for Postgraduate Students
...Show More Authors

The current research aims to identify the achievement of goals and the significance of the differences in achieving goals according to the variable of gender (male-female), specialization (scientific-human), and the stage (Master-PhD) for postgraduate students. To achieve the goals of the current research, the researcher developed a scale of achieving goals that was built according to the theory of (Lock & Latham 1990), which was applied to a sample of (257) male and female students who were selected randomly with a proportional distribution for the academic year (2021-2022). The scale of achieving goals consists of (30) items. The current research found that the research sample of postgraduate students has achieved their goals in ge

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Civil And Environmental Engineering
Constructing a Corrected Stations Network Using Some Geomatic Techniques
...Show More Authors
Abstract<p>The major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R<sup>2</sup>) is 0.077 m observed in Northing. While in</p> ... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Error Investigation for Free Form Surfaces in Bezier Techniques
...Show More Authors

Surface modeling utilizing Bezier technique is one of the more important tool in computer aided geometric design (CAD). The aim of this work is to design and implement multi-patches Bezier free-form surface. The technique has an effective contribution in technology domains and in ships, aircrafts, and cars industry, moreover for its wide utilization in making the molds. This work is includes the synthesis of these patches in a method that is allow the participation of these control point for the merge of the patches, and the confluence of patches at similar degree sides due to degree variation per patch.  The model has been implemented to represent the surface. The interior data of the desired surfaces designed by M

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Proceedings Of The Eleventh International Network Conference (inc 2016)
A review on power consumption reduction techniques on OFDM
...Show More Authors

Scopus (2)
Scopus
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
Improve Data Mining Techniques with a High-Performance Cluster
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref