The research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen in a random stratified manner from students at the University of Baghdad, College of Education for Pure Sciences/Ibn Al-Haitham, Department of Computer. The proposed AI model utilized three artificial intelligence techniques: Decision Tree (DT), Random Forest (RF), and Gradient Boosting Machine (GBM). The classification accuracy using DT was 92.85 and using GMB was 95.23. The RF technique was applied to find the essential features, and the Pearson correlation was used to find the correlation between the features. The findings indicated that students indeed possess digital intelligence, underscoring the potential for tailored interventions to enhance their digital skills and competencies. This research not only sheds light on the current DI landscape among university students but also paves the way for targeted educational initiatives to foster digital literacy and proficiency in the academic setting.
This work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m
... Show MoreThe two-neutron halo-nuclei (17B, 11Li, 8He) was investigated using a two-body nucleon density distribution (2BNDD) with two frequency shell model (TFSM). The structure of valence two-neutron of 17B nucleus in a pure (1d5/2) state and in a pure (1p1/2) state for 11L and 8He nuclei. For our tested nucleus, an efficient (2BNDD's) operator for point nucleon system folded with two-body correlation operator's functions was used to investigate nuclear matter density distributions, root-mean square (rms) radii, and elastic electron scattering form factors. In the nucleon-nucleon forces the correlation took account of
... Show MoreThe effect of short range correlations on the inelastic Coulomb form factors for excited +2 states (1.982, 3.919, 5.250 and 8.210MeV) and +4 states (3.553, 7.114, 8.960 and 10.310 MeV) in O18 is analyzed. This effect (which depends on the correlation parameterβ) is inserted into the ground state charge density distribution through the Jastrow type correlation function. The single particle harmonic oscillator wave function is used with an oscillator size parameter .b The parameters β and b are adjusted for each excited state separately so as to reproduce the experimental root mean square charge radius of .18O The nucleusO18 is considered as an inert core of C12 with two protons and four neutrons distributed over 212521211sdp−− activ
... Show MoreIn many areas, such as simulation, numerical analysis, computer programming, decision-making, entertainment, and coding, a random number input is required. The pseudo-random number uses its seed value. In this paper, a hybrid method for pseudo number generation is proposed using Linear Feedback Shift Registers (LFSR) and Linear Congruential Generator (LCG). The hybrid method for generating keys is proposed by merging technologies. In each method, a new large in key-space group of numbers were generated separately. Also, a higher level of secrecy is gained such that the internal numbers generated from LFSR are combined with LCG (The adoption of roots in non-linear iteration loops). LCG and LFSR are linear structures and outputs
... Show MoreAbstract
The pressures of life have become a tangible phenomenon in all societies in varying degrees. This disparity determines several factors, including the nature of societies, the level of their urbanization, the intensity of interaction, the intensity of conflict, and the increasing rate of change in those societies. many people name The modern era in which we live the “era of pressures", where one of the most important of these changes is the “new Coronavirus 19-COVID”, which has spread widely throughout the world, as the pandemic, has affected all aspects of daily life, including the educational and academic process, academic activities have been suspended in universities, which caused sudden change
... Show MoreThe literature shows conflicting outcomes, making it difficult to determine how e-learning affects the performance of students in higher education. The effect of e-learning was studied and data has been gathered with the utilization of a variety of qualitative and quantitative methods, especially in relation to students' academic achievements and perceptions in higher education, according to literature review that has been drawn from articles published in the past two decades (2000-2020). The development of a sense of community in the on-line environment has been identified to be one of the main difficulties in e-learning education across this whole review. In order to create an efficient online learning community, it could be claim
... Show MoreThis study investigates self-perception and self-branding on Instagram among young Arab women in the UAE, focusing on how they curate, negotiate and perform their digital identities and whether their digital self-presentation in any way compromises their sense of authenticity. The study is based on 11 interviews with young women in the UAE, between the ages of 20 and 30, in addition to online observation to follow the participants’ activities on Instagram. The study demonstrates that while social and digital media platforms may play a role in “empowering” Arab women, women tend to set their boundaries of authenticity shaped according to their audience’s expectations and their in-groups. This confirms the r
... Show MoreThe research aims to determine the required rate of return according to the Fama and French five-factor model, after strengthening it by adding the indebtedness factor to build the Fama and French six-factor model FF6M-DLE. The effect of the indebtedness factor on the company's profitability and the real value of the ordinary shares calculated according to the (equivalent ascertainment) model and its suitability with the company's situation, and an analysis of the fluctuation between the market value and the real value of the ordinary stocks.
Deep learning techniques are applied in many different industries for a variety of purposes. Deep learning-based item detection from aerial or terrestrial photographs has become a significant research area in recent years. The goal of object detection in computer vision is to anticipate the presence of one or more objects, along with their classes and bounding boxes. The YOLO (You Only Look Once) modern object detector can detect things in real-time with accuracy and speed. A neural network from the YOLO family of computer vision models makes one-time predictions about the locations of bounding rectangles and classification probabilities for an image. In layman's terms, it is a technique for instantly identifying and recognizing
... Show MoreThe main factors that make it possible to get the corrosion of reinforcing steel in concrete are chloride ions and the absorption of carbon dioxide from the environment, and each of them works with a mechanism which destroys the stable immunity of rebar in the concrete. In this work the effect of carbon dioxide content in the artificial concrete solution on the corrosion behavior of carbon steel reinforcing bar (CSRB) was studied, potentiostatically using CO2 stream gas at 6 level of concentrations; 0.03 to 2.0 weight percent, and the effect of rising electrolyte temperature was also followed in the range 20 to 50ᴼ C. Tafel plots and cyclic polarization procedures were obeyed to investigate the c
... Show More