The research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen in a random stratified manner from students at the University of Baghdad, College of Education for Pure Sciences/Ibn Al-Haitham, Department of Computer. The proposed AI model utilized three artificial intelligence techniques: Decision Tree (DT), Random Forest (RF), and Gradient Boosting Machine (GBM). The classification accuracy using DT was 92.85 and using GMB was 95.23. The RF technique was applied to find the essential features, and the Pearson correlation was used to find the correlation between the features. The findings indicated that students indeed possess digital intelligence, underscoring the potential for tailored interventions to enhance their digital skills and competencies. This research not only sheds light on the current DI landscape among university students but also paves the way for targeted educational initiatives to foster digital literacy and proficiency in the academic setting.
Computer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties, Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application. This study comes to shed light on the legal nature of computer
... Show MoreEmbracing digital technological advancements in media and communication has led government entities to adopt communication practices fully aligned with the digital and networked system in government communication. Traditional media practices within the government environment increasingly rely on the ability to utilize digital tools and systems for content creation, communication, evaluation, and the management of the entire communication process within an electronic and intelligent framework for government services. Naturally, this transformation has caught the attention of communication and public relations researchers worldwide, as the digital and networked aspects of government communication now form an intelle
... Show MoreThis study is planned to find relationship between interleukin-33 (IL-33) with its receptor interleukin-1 receptor 4 (IL-1R4), and assurance IL-33/IL-1R4 proportion as biomarker to atherosclerosisin rheumatoid arthritis (RA) Iraqi females patients with and without dyslipidemia. This study was attempted at Baghdad Teaching Hospital included 60 females patients with RA that were isolated into: 30 patients with dyslipidemia(G2), 30 patients without dyslipidemia(G3) and 30 individual as control group (G1) .Patients were experiencing treatment by methortexiene medication, analyzed by rheumatoid factor(RF) and erythrocyte sedimentation rate( ESR) tests. All patients and control groups age ranged from (30-55) years. The results sho
... Show MoreBackground: Rheumatoid arthritis (RA) is an autoimmune disorder that involves autoantibodies attacking and weakening joints. RA is characterized by leukocyte (Monocyte, Lymphocyte mast cell .etc) infiltrations into the synovial compartment leading to inflammation in the synovial membrane. Synovitis leads to the release of pro-inflammatory cytokines, matrix metalloproteinases, chemokines, complement proteins, and growth factors. Objective: The current study pointed to verify the diagnostic values of interleukin -17 A and interleukin -18 in Rheumatoid arthritis (RA) patients and the effect of treatment thereon. Study subjects and methods: A total of 88 samples with RA were selected from the health clinics of AL-Yarmouk
... Show MoreRheumatoid arthritis (RA) was a chronic inflammatory autoimmune disease for long-term that primarily affects small joints and leads to chronic inflammation in synovial. The aimed of the study to identify the relationships among some serological markers (antibodies to citrullinated protein/peptide antigens (ACPAs), anti-mutated citrullinated vimentin (anti-MCV), anti-carbamylated protein (Anti-Carp), anti- heterogeneous nuclear ribonucleoproteins (anti-hnRNP) and Glucose-6-phosphate isomerase (GPI)) and early diagnosis of RA. The study involved (60) Patients of newly diagnosis with RA that divided in to two subgroups (30 RF positive and 30 RF negative) groups and 30 subjects as healthy control group. The serological data from serum
... Show MoreBackground: The gene responsible for encoding the protein of cytotoxic T lymphocyte-associated antigen-4 (CTLA-4) has been found to be associated with rheumatoid arthritis (RA) in different ethnic populations. But the association of +49A/G CTLA-4 polymorphism with susceptibility of RA among Iraqi Arab populations has not yet been determined. Methods: One hundred and seventy-eight patients were examined, 67 of them were males (mean age 54.71 ± 10.4 years), while 167 were examined for the control group, of whom 64 were males and the rest were females. CTLA-4 DNA genotyping was carried on to determine the +49 A/G (rs231775) polymorphism using a polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP). Enzyme-linked immuno
... Show MoreThe secure data transmission over internet is achieved using Steganography. It is the art and science of concealing information in unremarkable cover media so as not to arouse an observer’s suspicion. In this paper the color cover image is divided into equally four parts, for each part select one channel from each part( Red, or Green, or Blue), choosing one of these channel depending on the high color ratio in that part. The chosen part is decomposing into four parts {LL, HL, LH, HH} by using discrete wavelet transform. The hiding image is divided into four part n*n then apply DCT on each part. Finally the four DCT coefficient parts embedding in four high frequency sub-bands {HH} in
... Show MoreThis research is concerned with documenting and chronicling the art of NFTs art in the Saudi artistic cultural scene, the importance of which stems from the lack of scientific sources that document this field until the preparation of this research and aims to trace historically the emergence of the field of NFTs art in the Kingdom of Saudi Arabia in the arts sector through the experiences of Saudi artists. The most prominent events for the culture, arts and technology sector, and other Saudi sectors. The research dealt with the history of the emergence of the field of NFTs art, which extends from the history of digital arts, and reviewed the most famous works of NFTs art.
As a result of the technical revolution and the artistic move
In this paper, an adaptive medical image watermarking technique is proposed based on wavelet transform and properties of human visual system in order to maintain the authentication of medical images. Watermark embedding process is carried out by transforming the medical image into wavelet domain and then adaptive thresholding is computed to determine the suitable locations to hide the watermark in the image coefficients. The watermark data is embedded in the coefficients that are less sensitive into the human visual system in order to achieve the fidelity of medical image. Experimental results show that the degradation by embedding the watermark is too small to be visualized. Also, the proposed adaptive watermarking technique can preserv
... Show MoreThis Book is intended to be a textbook studied for undergraduate course in financial statistics/ department of Financial Sciences and Banking. This book is designed to be used in semester system. To achieve the goals of the book, it is divided into the following chapters. Chapter one introduces basic concepts. Chapter two devotes to frequency distribution and data representation. Chapter three discusses central tendency measures (all types of means, mode, and median). Chapter four deals with dispersion Measures (standard deviation, variance, and coefficient of variation). Chapter five concerned with correlation and regression analysis. While chapter six concerned with testing Hypotheses (One population mean test, Two "independent" populati
... Show More