The majority of Arab EFL (English as a Foreign Language) learners struggle with speaking English fluency. Iraqi students struggle to speak English confidently due to mispronunciation, grammatical errors, short and long pauses while speaking or feeling confused in normal conversations. Collaborative learning is crucial to enhance student’s speaking skills in the long run. This study aims to state the importance of collaborative learning as a teaching method to EFL learners in the meantime. In this quantitative and qualitative study, specific focus is taken on some of Barros’s views of collaborative learning as a teamwork and some of Pattanpichet’s speaking achievements under four categories: academic benefits, social benefits, generic skills, and negative aspects. 100 undergraduate students, whose level at the first academic year in College of Veterinary Medicine, the University of Baghdad-Iraq, have participated in this experimental study. The results of independent and dependent variables estimated Cronbach’s Alpha high internal consistency. The study data chooses the alternative hypothesis maintaining that the treatment effect was statistically significant. Collaborative learning correlates positively with development of Iraqi EFL learners of speaking skills on academic benefits, social benefits, and generic skills at the level of significance, unlike passive correspondence. It was risen with negative aspects. The main limitations of the current study were that of small sample size of Iraqi EFL learners among medical colleges. The results revealed merely one medical college among other colleges in medicine, science, social and human studies at the University of Baghdad. It has not covered other levels of undergraduate study. The study recommends additional investigations to explore the value of collaborative learning to achieve student’s speaking skills in human and social fields of the Arab and foreign learning communities
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreChurning of employees from organizations is a serious problem. Turnover or churn of employees within an organization needs to be solved since it has negative impact on the organization. Manual detection of employee churn is quite difficult, so machine learning (ML) algorithms have been frequently used for employee churn detection as well as employee categorization according to turnover. Using Machine learning, only one study looks into the categorization of employees up to date. A novel multi-criterion decision-making approach (MCDM) coupled with DE-PARETO principle has been proposed to categorize employees. This is referred to as SNEC scheme. An AHP-TOPSIS DE-PARETO PRINCIPLE model (AHPTOPDE) has been designed that uses 2-stage MCDM s
... Show More<span lang="EN-US">The need for robotics systems has become an urgent necessity in various fields, especially in video surveillance and live broadcasting systems. The main goal of this work is to design and implement a rover robotic monitoring system based on raspberry pi 4 model B to control this overall system and display a live video by using a webcam (USB camera) as well as using you only look once algorithm-version five (YOLOv5) to detect, recognize and display objects in real-time. This deep learning algorithm is highly accurate and fast and is implemented by Python, OpenCV, PyTorch codes and the Context Object Detection Task (COCO) 2020 dataset. This robot can move in all directions and in different places especially in
... Show MoreThe ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communi
... Show MoreAdvanced strategies for production forecasting, operational optimization, and decision-making enhancement have been employed through reservoir management and machine learning (ML) techniques. A hybrid model is established to predict future gas output in a gas reservoir through historical production data, including reservoir pressure, cumulative gas production, and cumulative water production for 67 months. The procedure starts with data preprocessing and applies seasonal exponential smoothing (SES) to capture seasonality and trends in production data, while an Artificial Neural Network (ANN) captures complicated spatiotemporal connections. The history replication in the models is quantified for accuracy through metric keys such as m
... Show MoreAutorías: Muwafaq Obayes Khudhair, Sanaa Rabeea Abed, Hayder Talib Jasim. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 1, 2023. Artículo de Revista en Dialnet.
In this study, a traumatic spinal cord injury (TSCI) classification system is proposed using a convolutional neural network (CNN) technique with automatically learned features from electromyography (EMG) signals for a non-human primate (NHP) model. A comparison between the proposed classification system and a classical classification method (k-nearest neighbors, kNN) is also presented. Developing such an NHP model with a suitable assessment tool (i.e., classifier) is a crucial step in detecting the effect of TSCI using EMG, which is expected to be essential in the evaluation of the efficacy of new TSCI treatments. Intramuscular EMG data were collected from an agonist/antagonist tail muscle pair for the pre- and post-spinal cord lesi
... Show MoreAbstract
Through this study, I tried to identify the grammatical efforts of one of the most important authors of the footnotes that were built on the luminous benefits marked with (Explanation of Mulla Jami in Grammar), and he is Sheikh Isamah Allah Al-Bukhari, who died in the eleventh century AH, trying as much as possible to stay away from the path of tradition in repeating the efforts of Those who preceded me in explaining the grammatical efforts of many grammarians, and perhaps what helped me in this is the characteristics that characterize the notes owners that may distinguish them from other owners of grammatical authorship, as a result of what characterized the personality of the notes owners from the predominance of the in
... Show MoreA three-stage learning algorithm for deep multilayer perceptron (DMLP) with effective weight initialisation based on sparse auto-encoder is proposed in this paper, which aims to overcome difficulties in training deep neural networks with limited training data in high-dimensional feature space. At the first stage, unsupervised learning is adopted using sparse auto-encoder to obtain the initial weights of the feature extraction layers of the DMLP. At the second stage, error back-propagation is used to train the DMLP by fixing the weights obtained at the first stage for its feature extraction layers. At the third stage, all the weights of the DMLP obtained at the second stage are refined by error back-propagation. Network structures an
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show More