The increasing amount of educational data has rapidly in the latest few years. The Educational Data Mining (EDM) techniques are utilized to detect the valuable pattern so that improves the educational process and to obtain high performance of all educational elements. The proposed work contains three stages: preprocessing, features selection, and an active classification stage. The dataset was collected using EDM that had a lack in the label data, it contained 2050 records collected by using questionnaires and by using the students’ academic records. There are twenty-five features that were combined from the following five factors: (curriculum, teacher, student, the environment of education, and the family). Active learning had been utilized in the classification. Four techniques had been applied for classifying the features: Random Forest (RF) algorithm, Label Propagation (LP), Logistic Regression (LR), and Multilayer Perceptron (MLP). The accuracies of prediction were 95.121%, 92.195%, 92.292%, and 93.951% respectively. Also, the RF algorithm has been utilized for assorting the features depending on their importance.
The current research aims to find out the extent to which students of the Faculty of Education for Pure Sciences\/Ibn al-Haitham have owned laboratory academic skills, the researcher adopted a descriptive research approach to conform to the goal of the research, the research sample the consisted of 140 students from the Department of Chemistry Phase II, The research tool, which consisted of a measure of laboratory academic skills, which consisted of seven skills and consisted of 28 paragraphs (four paragraphs per field), was prepared and the pent-up scale was chosen because the selected sample were university students, and the results showed the ownership of students' skills of laboratory academic skills other than skill The use of the libr
... Show MoreIt's for sure that TV or cinematic production requires an effort that is described to be large according to the script , thus we find a production sectors that couldn't fulfill these tasks especially in Iraq for its current challenges , although we found the department of film & television have a large quantity that could be described as big comparing to the Iraqi production sectors , alongside what it does provides to the Iraqi dramatic movement , but the cause that the management of this department is looking for is the quality that osmosis an dramatic & atheistic value , this production quantity that is productions operations frequently is attacked by lagging that came from many reasons that " May or May not " known to the spe
... Show MoreNetwork security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed
Research in the field of English language as a foreign language (EFL) has been consistently highlighted the need for communicative competence skills among students. Accompanied by the validated positive impact of technologies on students’ skills’, this study aims to explore the strategies used by EFL students in enhancing their communicative competence using digital platforms and identify the factors of developing communicative competence using digital platforms (linguistic factors, environmental factors, psychological factors, and university-related factors). The mixed-method research design was utilized to obtain data from Iraqi undergraduate EFL students. The study was conducted in the Iraqi University in Baghdad Iraq. EFL undergradu
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreAn optoelectronic flow-through detector for active ingredients determination in pharmaceutical formulations is explained. Two consecutive compact photodetector’s devices operating according to light-emitting diodes-solar cells concept where the LEDs acting as a light source and solar cells for measuring the attenuated light of the incident light at 180˚ have been developed. The turbidimetric detector, fabricated of ten light-emitting diodes and five solar cells only, integrated with a glass flow cell has been easily adapted in flow injection analysis manifold system. For active ingredients determination, the developed detector was successfully utilized for the development and validation of an analytical method for warfarin determination
... Show MoreThis research aims at measuring the relationship between moral intelligence and academic adjustment for sixth year primary School Pupils.
The research is assigned to sixth year primary school pupils- Baghdad –the 2nd karkh of the both genders .The total sample includes (500) pupils .The researchers has built two scales one for Moral Intelligence and another for Academic Adjustment and applied them on the total sample of the research .The researchers treated data by appropriate statistical means .The research has reached the following results:
- The pupils of sixth year primary school characterized by Moral Intelligence.
- The
<p>Analyzing X-rays and computed tomography-scan (CT scan) images using a convolutional neural network (CNN) method is a very interesting subject, especially after coronavirus disease 2019 (COVID-19) pandemic. In this paper, a study is made on 423 patients’ CT scan images from Al-Kadhimiya (Madenat Al Emammain Al Kadhmain) hospital in Baghdad, Iraq, to diagnose if they have COVID or not using CNN. The total data being tested has 15000 CT-scan images chosen in a specific way to give a correct diagnosis. The activation function used in this research is the wavelet function, which differs from CNN activation functions. The convolutional wavelet neural network (CWNN) model proposed in this paper is compared with regular convol
... Show More