Computer literacy is an urgent necessity for university students, given the rapid development in the means of communication in which we live in this era, and the flow of abundant information. Mainly on the computer in all administrative and academic transactions, where first of all the registration for the semester is done through the computer. Computer culture has many characteristics and advantages that distinguish it from other sciences, includ-ing the concept of computer culture that cannot be defined absolutely, and it is difficult to define its levels, because the specifications of the computer-educated individual differ from one individual to another, and from time to time also, you find it a luxury in a country What, and you find it necessary in another country. In order to measure and know the level of computer cul-ture among university students, a computerized scale of (40) items with five multiple-choice alternatives was built. In order to know that they have the skills of searching for information electronically, a computerized scale of (21) items was prepared, and a five-point Likert scale was adopted. Results showed that they have computer literacy and therefore they have skills of searching for information electronically at all.
Objective: The aim of the research is to prepare skilled mental exercises according to spatial and temporal perceptions and the awareness of the strength of young pole-vaulters, and to recognize the impact of these exercises on improving the indicators of electrical activity of working muscles and some special physical abilities and accomplishing this effectiveness Research methodology: The researcher used the experimental curriculum (one experimental group), and included the sample of research on (5) two joint jumpers in the Iraqi club championship, all from the center of talent in athletics, the sample is trained on the same curriculum prepared by the coach himself but accompanied by a mental training approach that Prepared by the
... Show MoreThe studying trying to determine the role of Strategic Intelligence on the Process of Green Manufacturing of Sample of Mineral water factories at Dahuk city. The study submit a theoretical frame of Strategic Intelligence and Green Manufacturing, a supposed sample, had been set to reverye the nature of the relations and effect in the study Varity, the study depend on group of the main and branch concurring with the relations and effect between the Strategic Intelligence and Green Manufacturing to answer the following questions about research to problems:
What are the relationships and effects between stra
... Show MoreAbstract
The aim of the research to define the concept of moral intelligence and its dimensions and its relationship to some personal characteristics with the internal auditors and identify the importance of the employment of moral intelligence dimensions of (empathy, conscience, self- control, respect, kindness, tolerance, fairness) in the internal audit and the extent of support for the performance of the internal audit process in light of these dimensions. And that by answering the following question : Is there a role for moral intelligence of internal auditors in support the performance of internal audit process ? How are employ these dimensions i
... Show MoreTo perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreAn accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi
... Show More