Online examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical methods. In order to verify that the design of the questionnaire, has been followed up with two steps of verification. First of all, a approval stage within that , the list of questions examined by the section of specialists in this subject in computer technology and teaching in universities, the feedback received was implemented before proceeding in order in order to this second stage . Second of all, the pilot research has been carried out to check the dependability of the factors . The gathered data has been examined using the Cronbach’s Alpha coefficient dependability test in SPSS 18 software package. This final results demonstrated this all factors are dependable as they acquired a value of 0.9126 and above inside test.
This study aims to evaluate the performance of emergency departments according to international standards through studying the performance in some of Iraqi public hospitals, where the evaluation performance is considered one of the important topics that take a great deal of officials' attention, especially decision makers in health organizations.
The researcher has derived the research idea from the importance of work in emergency department in hospitals and to what it provides of medical services and quick and immediate nursing care that help in patients' lifesaving, and it is the mirror that reflects the real image for the hospital
... Show MoreAbstract.The goal of this article is to find the CEO of Iraqi companies that use strategic planning and determine if they are capable of diagnosing the traits of strategic planning systems that improve these companies' capacity to successfully address crisis-related needs. The capacity of the company to successfully react to crisis needs and demands is enhanced by the use of strategic planning, according to a review of data from 64 enterprises utilizing statistical analysis. Furthermore, top and division or unit managers must be involved and committed for strategic planning to be successful. It also has to be planned with an external orientation and get more than just lip service from top and unit or division level managers. In other words,
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreThe aim of the present research is to identify the test wisdom and the engagement with learning and psychological tension among postgraduate students at the University of Samarra according to the variables of the department, gender, age, and whether students are employee or non-employee. The study also attempts to identify the relationship between the test wisdom and the engagement with learning and psychological tension. The research sample consisted of (75) postgraduate students randomly selected from college of Education. The researcher applied the test–wisdom of (Mellman & Ebel) and the scale of engagement with learning preparation by (Al-zaabi 2013). In addition, the researcher used the list of the psychological stress of (Abu
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreThis research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
Software-Defined Networking (SDN) has evolved network management by detaching the control plane from the data forwarding plane, resulting in unparalleled flexibility and efficiency in network administration. However, the heterogeneity of traffic in SDN presents issues in achieving Quality of Service (QoS) demands and efficiently managing network resources. SDN traffic flows are often divided into elephant flows (EFs) and mice flows (MFs). EFs, which are distinguished by their huge packet sizes and long durations, account for a small amount of total traffic but require disproportionate network resources, thus causing congestion and delays for smaller MFs. MFs, on the other hand, have a short lifetime and are latency-sensitive, but they accou
... Show MoreThe research aims to identify intelligence spiritual among a sample of students Baghdad University as well as to identify the differences between students in intelligence spiritual according to variable type (male - female), and variable area of study (Science - a human) and variable (First grade - fourth grade), The research sample consisted of (300) students, were applied scale search - a spiritual Intelligence Scale (prepared by the researcher), has resulted in the search results for: -
The students of the University of Baghdad (sample) enjoyed a high level of spiritual intelligence.
- There are no differences between males and females in the spiritual intelligence.
- There
Abstract
This research aims to study human error effects in the banking risks in the private banks through the measurement and testing of human error effect in every kind of banking risks types and stand on the most closely associated with the risks in order to focus on them and make appropriate processors have with respect to and increase the availability of skills and expertise required to carry out banking operations of error-free manner.
Find dealt with human error in terms of meaning and understandable, classifications and types, causes and consequences and its approaches and theories. Also addressed placed banking risks in terms of meaning and concept, species and entr
... Show MoreAbstract
The research stems from the problem that focuses on a number of questions. They are as follows: What is the extent of interest in the topic of efficiency by the banks and their role in raising the efficiency of the banking business and its development? Is the banking efficiency used in Iraqi banks clear and specific for the Iraqi banking sector? How the banking sector efficiency is measured and what are the approaches adopted in determining the banking inputs and outputs? What is the level of efficiency in the research sample of the banks and what are the causes of its decline or rise in private banks individually and in the Iraqi banking sector in general?
The re
... Show More