Preferred Language
Articles
/
jperc-1645
Cognitive Behavioral Therapy for Internet Addicts
...Show More Authors

The study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups:  a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sessions per week that lasted for one month and a half, the time of each session was (45) minutes. The results revealed that there are statistically significant differences between the mean scores of the experimental group and the control group before and after applying the treatment program in favor of the post-measurement. The study came out with a set of recommendations and proposals

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 08 2018
Journal Name
Iraqi Journal Of Information Technology
Google Scholar and The scientific originality of the professor
...Show More Authors

The aim of the research is try to answer the questions about the importance of the participation of scientists in the scientific researcher Google Scholar for the professor and the university, and the extent of participation of Iraqi universities, and the rank of the University of Qadisiyah, and the number of participants and teachers of this engine, The research came out with several conclusions, the most important of which is that (21%) of university professors are involved in the google engine and most of the participants did not carry their full research through the site

View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Job enrichment, knowledge capital and its impact on strategic success: exploratory study at a sample of the Iraqi government and Private Colleges on Baghdad
...Show More Authors

The problem of research was the lack of research that dealt with issue of the job design approach that is more suitable for knowledge work, therefore, the research aims to determine the impact of job enrichment,  and knowledge capitalon strategic success, starting from the hypothesis that there significant impact of job enrichment and knowledge capital on strategic success, to achieve this goal the researchers from the theoretical literature and  related studies conclude to the construction of the scheme shows the hypothetical relationship between the variables, which was adopted job enrichment as independent variable while knowledge capital plays two roles, the first as an independent variable and the second as an intermediate

... Show More
View Publication
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving IoT Applications Using a Proposed Routing Protocol
...Show More Authors

The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
The role of the theatrical technical supervisor in developing the skills of preparatory stage learners
...Show More Authors

The current study aimed to identify the role of the theatrical technical supervisor in developing and enhancing the skills of middle school students in Baghdad. The sample consisted of 73% of the original community of theatrical technical supervisors, randomly selected from those working in the first, second, and third educational directorates in the Rassafa and Karkh areas. The sample size was 32 theatrical technical supervisors. The study used a questionnaire to collect data on three axes: the cognitive skills developed by the theatrical technical supervisor, the voice and speech skills developed by the supervisor, and the body movement skills developed by the supervisor. The results showed that the theatrical technical supervisor play

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Revue Académique De La Recherche Juridique
المسؤولية الجزائية لمزودي خدمة الإنترنت عن جريمة التنمر الإلكتروني.
...Show More Authors

يُعد التنمر ظاهرة إجتماعية قديمة موجودة في جميع المجتمعات سواء أكان المجتمع صناعيًا أم ناميًا، كما يُعد من المفاهيم الحديثة نسبيًا، وربما يرجع لحداثة الإعتراف به نوعًا من أنواع العنف فضلاعن ندرة الدراسات التي تناولته وعدم وجود معيار محدد لتحديد السلوك الذي يعد تنمرًا أم عابرًا، لقد بدأ الأهتمام بدراسة التنمر في سبعينات القرن الماضي وأصبح موضعًا يحضى بأهتمام العديد في مختلف البلدان، وفي عصرنا الحالي تطورت

... Show More
View Publication
Publication Date
Wed Aug 16 2023
Journal Name
مجلة الاستاذ للعلوم الانسانية والاجتماعية- كلية التربية ابن رشد – جامعة بغداد،
Using the Theory of Conceptual Metaphor in Two Sonnets by Victorian Female Poets
...Show More Authors

This study has applied the theoretical framework of conceptual metaphor theory to the analysis of the source and target domains of metaphors that are used in two English nineteenth century sonnets, both written by contemporaneous female poets. The quantitative and qualitative results of the textual analysis have clearly revealed that Elizabeth Barrett Browning’s sonnet 23 centres around the conceptual mapping of the journey of love and life with that of possession. In contrast, Christina Rossetti’s sonnet Remember tackles the central conceptual mapping of death as a journey in relation to its further experiential connections. In addition, the application of conceptual metaphor theory in identifying the frequencies and densities of metap

... Show More
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The role of intellectual capital in promoting financial performance an applied study on a sample of the companies listed in Iraq stock exchange
...Show More Authors

The interest in the intellectual capital and its development is a civilized necessity imposed by the requirements of the times and cannot imagine an advanced society in its potential productivity in poor efficiency of human capital, and features the work environment change permanently, putting the management of financial companies against a constant challenge toward coping with new developments in this changing environment and this is not taken unless owned by these companies qualified human resources and the provision of Culture organizers have, which manifested itself with the research problem by the following two questions:

  1. Did the intellectual capital value specific financial and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Spike neural network as a controller in SDN network
...Show More Authors

The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.

View Publication Preview PDF
Crossref (2)
Crossref