Preferred Language
Articles
/
joe-2238
Effect Of Technology Based Learning As A Supplement To Traditional Technology On Student's Achievement
...Show More Authors

This paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures. This paper studies the effect of using relatively new technology appearing in classroom today which is real time response system (voting system), that serves as real – time windows into each students understand of concepts. These devices can provide a foundation decision making based on data at scale never before possible as well as increasing students learning and engagement with each other as well with the lecturer, also, another new technology the "Bluetooth broadcasting system" is applied which is one of the moderate technique towards M- learning, this tool is used to transfer audio, video, text, notes, etc to the mobile of the students as well as laptop. The computer based examination, interactive board, and notepad as well as free wire and wireless internet access are used to close the digital divide and increasing technology literacy in all students which was one of the challenges, additional challenges include “social loafing,” characterized by
students who work less diligently than they otherwise might, or who become frustrated by course material or technology and thus less engaged. Finally the other colleague's resistance to the use of technology in learning and its effect on students learning is discussed based on practical situations.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 15 2020
Journal Name
Arab World English Journal
Posters in Vocabulary Learning
...Show More Authors

An essential element in English as a foreign language (EFL) learning is vocabulary. There is a big emphasis on learning the new words' meaning from the books or inside classrooms. Also, it is a major part of language teaching as well as being fundamental to the learner but there is a big challenge in vocabulary instruction due to the weak confidence by teachers in selecting the suitable practice in teaching vocabulary or they sometimes unable to specify a suitable time for it during the teaching process. The major aim of this study is to investigate the value of posters in vocabulary learning on the 2nd grade students at Halemat Alsaadia High School in Baghdad – Iraq. It hypothesized that there are no statistically significant differences

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the cost of consulting services under the traditional cost approach and the performance-based costing technique and its impact on achieving profits : Applied research in the advisory office of Al-Khwarizmi College of Engineering - University of Baghdad
...Show More Authors

Abstract:

                    This research aims to apply the Performance Focused Activity Based Costing System in the consultant office of Al-Khwarizmi College of Engineering at the University of Technology for the purpose of measuring the cost of consulting services provided by these offices in order to reduce costs and their reflection in achieving profits. For the purpose of calculating costs accurately, and to test the hypothesis of the research, the research was applied in the office of the consultant of the College of Engineering Al-Khwarizm - University of Baghdad through the financial statement

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (14)
Crossref (6)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EFFECT OF ADDING DIFFERENT LEVELS OF DILL SEEDS TO THE DIET ON PHYSIOLOGICAL TRAITS OF BROILERS : EFFECT OF ADDING DIFFERENT LEVELS OF DILL SEEDS TO THE DIET ON PHYSIOLOGICAL TRAITS OF BROILERS
...Show More Authors

ABSTRACT

This study was conducted in the poultry field of the department of animal production, college of agricultural engineering sciences, university of Baghdad for the period from 10/15/2021 to 11/25/2021 with the aim of showing the effect of adding different levels of dill seeds to the diet on productive and carcass traits For broiler meat. In this study, 200 unsexed broiler chicks of breed (Ross 308) were used, one day age, with a starting weight of 41.46 g. The chicks were randomly distributed to 5 treatments, and each treatment included 4 replicates, 10 birds for each replicate. The birds were fed three diets: the starter diet, the growth diet and the final diet. The experiment treatments were T1,

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
Measurable Mistakes in Architecture the Effect of Designer's Experience on the Propagation of Mistakes in Architectural Design - Residential Buildings in Al Sulaymaniyah City as a Case Study
...Show More Authors

The importance of physical and nonphysical architectural design values made architectural designers need good experience to be experts of architectural values reasonably without neglecting any value in the design process.  The importance of such values made that ignoring any values and mistakes occurs in the design process. Simultaneously, architectural designers' different nature and the difference in their experiences are causing different understandings of the design values, thus causing architectural mistakes. The research problem appears from the randomly propagating of mistakes in contemporary architecture, which is about to become a phenomenon in Al Sulaymaniyah city. The research aims to find the main reason

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A Haptic feedback system based on leap motion controller for prosthetic hand application
...Show More Authors

Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref