Preferred Language
Articles
/
nhilXJYBVTCNdQwCb4MO
Utilizing Machine Learning Techniques to Predict University Students' Digital Competence
...Show More Authors

Given the importance of possessing the digital competence (DC) required by the technological age, whether for teachers or students and even communities and governments, educational institutions in most countries have sought to benefit from modern technologies brought about by the technological revolution in developing learning and teaching and using modern technologies in providing educational services to learners. Since university students will have the doors to work opened in all fields, the research aims to know their level of DC in artificial intelligence (AI) applications and systems utilizing machine learning (ML) techniques. The descriptive approach was used, as the research community consisted of students from the University of Baghdad in its colleges with scientific and human specializations. To measure the level of DC, a questionnaire was applied as a data collection tool to a sample of 400 male and female students, distributed based on gender and academic specialization. The results showed that the sample students did not have high DC. Their possession of DC related to AI applications and systems was to a moderate degree. The results indicated that there were differences in the responses of the study sample members due to the gender variable and the specialization variable, in favor of the female students with scientific specialization.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Wireless Indoor Localization Systems and Techniques: Survey and Comparative Study
...Show More Authors

<p>The popularity, great influence and huge importance made wireless indoor localization has a unique touch, as well its wide successful on positioning and tracking systems for both human and assists also contributing to take the lead from outdoor systems in the scope of the recent research works. In this work, we will attempt to provide a survey of the existing indoor positioning solutions and attempt to classify different its techniques and systems. Five typical location predication approaches (triangulation, fingerprinting, proximity, vision analysis and trilateration) are considered here in order to analysis and provide the reader a review of the recent advances in wireless indoor localization techniques and systems to hav

... Show More
View Publication
Scopus (49)
Crossref (37)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Application of Data Mining Techniques on Tourist Expenses in Malaysia
...Show More Authors

Tourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Nov 12 2016
Journal Name
International Journal Of Mechanical Engineering And Technology (ijmet)
PERFORMANCE OF TWO-WAY NESTING TECHNIQUES FOR SHALLOW WATER MODELS
...Show More Authors

A new two-way nesting technique is presented for a multiple nested-grid ocean modelling system. The new technique uses explicit center finite difference and leapfrog schemes to exchange information between the different subcomponents of the nested-grid system. The performance of the different nesting techniques is compared, using two independent nested-grid modelling systems. In this paper, a new nesting algorithm is described and some preliminary results are demonstrated. The validity of the nesting method is shown in some problems for the depth averaged of 2D linear shallow water equation.

Publication Date
Thu May 05 2022
Journal Name
5g Impact On Biomedical Engineering
Wireless Techniques and Applications of the Internet of Medical Things
...Show More Authors

View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Numerical Investigation of Drag Reduction Techniques in a Car Model
...Show More Authors
Abstract<p>Reducing the drag force has become one of the most important concerns in the automotive industry. This study concentrated on reducing drag through use of some external modifications of passive flow control, such as vortex generators, rear under body diffuser slices and a rear wing spoiler. The study was performed at inlet velocity (V=10,20,30,40 m/s) which correspond to an incompressible car model length Reynolds numbers (Re=2.62×10<sup>5</sup>, 5.23×10<sup>5</sup>, 7.85×10<sup>5</sup> and 10.46×10<sup>5</sup>), respectively and we studied their effect on the drag force. We also present a theoretical study finite volume method (FVM) of solvi</p> ... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2018
Mixed Linearity Improvement Techniques for Ultra-wideband Low Noise Amplifier
...Show More Authors

<span>We present the linearization of an ultra-wideband low noise amplifier (UWB-LNA) operating from 2GHz to 11GHz through combining two linearization methods. The used linearization techniques are the combination of post-distortion cancellation and derivative-superposition linearization methods. The linearized UWB-LNA shows an improved linearity (IIP3) of +12dBm, a minimum noise figure (NF<sub>min.</sub>) of 3.6dB, input and output insertion losses (S<sub>11</sub> and S<sub>22</sub>)  below -9dB over the entire working bandwidth, midband gain of 6dB at 5.8GHz, and overall circuit power consumption of 24mW supplied from a 1.5V voltage source. Both UWB-LNA and linearized UWB-LNA designs are

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Mon Oct 06 2014
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Problem Based Learning on EFL Learners’ Achievement
...Show More Authors

The present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 20 2010
Journal Name
Mustansiria Dental Journal
Traumatic dental injuries of the permanent incisors and its relation to malocclusion in patients attending the pedodontic clinic in College of Dentistry, Baghdad University
...Show More Authors

Publication Date
Sat Apr 01 2017
Journal Name
Al–bahith Al–a'alami
Digital Communication: The Future of Identity in Arab TV Drama: A Field Study on a Sample of Arab Society in the UAE in 2017
...Show More Authors

The digital communication of a product of communication and information revolution. It is characterized by accurate and comprehensive in its services and its effects, which brought changes in the structure of many communities and their organizational structures. They have significant impacts on the social systems and social relations, especially in the Arab societies, which are the focus of the globalized Western media, for many reasons: economical, political , cultural and social.
According to this perception, the Arab identity has become in an encounter with big challenges by the globalized media of trade and the media, which aims to achieve greater profits because of identity and its importance to the communities. This occurs par

... Show More
View Publication
Crossref