Preferred Language
Articles
/
nhilXJYBVTCNdQwCb4MO
Utilizing Machine Learning Techniques to Predict University Students' Digital Competence
...Show More Authors

Given the importance of possessing the digital competence (DC) required by the technological age, whether for teachers or students and even communities and governments, educational institutions in most countries have sought to benefit from modern technologies brought about by the technological revolution in developing learning and teaching and using modern technologies in providing educational services to learners. Since university students will have the doors to work opened in all fields, the research aims to know their level of DC in artificial intelligence (AI) applications and systems utilizing machine learning (ML) techniques. The descriptive approach was used, as the research community consisted of students from the University of Baghdad in its colleges with scientific and human specializations. To measure the level of DC, a questionnaire was applied as a data collection tool to a sample of 400 male and female students, distributed based on gender and academic specialization. The results showed that the sample students did not have high DC. Their possession of DC related to AI applications and systems was to a moderate degree. The results indicated that there were differences in the responses of the study sample members due to the gender variable and the specialization variable, in favor of the female students with scientific specialization.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 06 2025
Journal Name
Journal Of Physical Education
The Effect of Special Exercises Using with Assisting Aids According to Differentiated Learning (Visual Learners) in Learning Crescent Kick in Fighters of Specialized Taekwondo schools
...Show More Authors

View Publication
Publication Date
Wed Oct 04 2023
Journal Name
Journal Of Al-qadisiya In Arts And Educational Sciences
The use of the digital book and the future of the paper book
...Show More Authors

The current research aims to know the complementary use of the paper book and the digital book by defining the paper book and the digital book and knowing the methods and methods of obtaining each of them and indicating the extent of their use and for what purpose and knowing the difficulties that researchers face in using each of them and which is better using the paper book or the digital book in preparing research Studies and for no reason. The research relied on the descriptive approach and the questionnaire as a tool for data collection, and it was distributed to professors and students of Iraqi universities. The research sample reached (219) individuals and reached a set of results, the most important of which are: Preference for the

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Stressful Life Events and their Relationship to Life Skills in Middle School Students
...Show More Authors

The current research aims to identify the stressful life events among middle school students in terms of gender (male-female), academic branch (scientific-literary), and the Life Skills of the students of the preparatory stage in terms of gender (male-female), and academic branch (scientific-literary). Additionally, the study aims to identify the relationship between stressful life events and life skills in middle school students. A sample of (200) students who were selected randomly from the Directorate of education of Baghdad Karkh/ III was used in this study. To achieve the objectives of the current research, the researcher has adopted two scales, the stressful life events scale for the researcher Al-Sultan (2008), and the life skills

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Engineering
Performance of 2- Link Robot by utilizing Adaptive Sliding Mode Controller
...Show More Authors

The Sliding Mode Control (SMC) has been among powerful control techniques increasingly. Much attention is paid to both theoretical and practical aspects of disciplines due to their distinctive characteristics such as insensitivity to bounded matched uncertainties, reduction of the order of sliding equations of motion, decoupling mechanical systems design. In the current study, two-link robot performance in the Classical SMC is enhanced via Adaptive Sliding Mode Controller (ASMC) despite uncertainty, external disturbance, and coulomb friction. The key idea is abstracted as follows: switching gains are depressed to the low allowable values, resulting in decreased chattering motion and control's efforts of the two-link robo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Studies In Systems, Decision And Control
Gap Analysis by Readiness Review Including Online Learning During COVID-19 Pandemic Period for Engineering Programs at the College of Engineering—University of Baghdad
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering And Sustainable Development
MEASURING THE URBAN INTEGRAL SUSTAINABILITY IN “MUSTANSIRIYA UNIVERSITY “ACCORDING TO THE INTEGRAL DESIGN THEORY
...Show More Authors

View Publication
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Mon May 19 2025
Journal Name
Retos
The effect of the cube model on visual-spatial intelligence and learning the skill of spiking in volleyball for female students
...Show More Authors

Objective: To identify the effect of the cube model on visual-spatial intelligence and learning the skill of spikinging in volleyball for female students, The researchers used the experimental method by designing two equivalent groups with pre- and post-measurements. Research methodology: The main research sample of (30) female students was selected from the research community represented by second-stage students in the College of Physical Education and Sports Sciences - University of Baghdad for the academic year (2024-2025). The sample was divided equally into two control and experimental groups. The researchers conducted the sample homogenization process and the equivalence process between the two groups in the variables of visua

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Aug 10 2022
Journal Name
Ibero-american Journal Of Exercise And Sports Psychology
The impact of applying the K-W-L self-scheduling technique on first-year intermediate students' learning of basic volleyball skills
...Show More Authors

The impact of applying the K-W-L self-scheduling technique on first-year intermediate students' learning of basic volleyball skills, Ayad Ali Hussein*, Israa Fouad Salih

View Publication Preview PDF
Scopus (7)
Scopus
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More