Given the importance of possessing the digital competence (DC) required by the technological age, whether for teachers or students and even communities and governments, educational institutions in most countries have sought to benefit from modern technologies brought about by the technological revolution in developing learning and teaching and using modern technologies in providing educational services to learners. Since university students will have the doors to work opened in all fields, the research aims to know their level of DC in artificial intelligence (AI) applications and systems utilizing machine learning (ML) techniques. The descriptive approach was used, as the research community consisted of students from the University of Baghdad in its colleges with scientific and human specializations. To measure the level of DC, a questionnaire was applied as a data collection tool to a sample of 400 male and female students, distributed based on gender and academic specialization. The results showed that the sample students did not have high DC. Their possession of DC related to AI applications and systems was to a moderate degree. The results indicated that there were differences in the responses of the study sample members due to the gender variable and the specialization variable, in favor of the female students with scientific specialization.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
The purpose of this study is to diagnose factors that effect Thi-Qar behavioral intention to use internet. A sample of (127) internet users of university staff was taken in the study and were analyzed by using path analyze . The study concluded that there is a set of affecting correlation. It was founded that exogenous variables (gender, income, perceived fun, perceived usefulness, Image, and ease of use) has significant effect on endogenous (behavioral intention) . The result of analysis indicated that image hopeful gained users comes first, ease of use secondly, perceived fan and perceived usefulness on (dependent variables (daily internet usage and diversity of internet usage. Implication of these result are discussed . the st
... Show MoreThe aims of this research is to investigate : The nature of academic specialization of the officials of Baghdad University Presidency , Level of job performance of the officials of Baghdad University Presidency through job performance appraisal form per year , Differences in the levels of job performance of the officials of Baghdad university presidency , according to the variables (sex , academic specialization , the current work , the duration between the date of graduation and the date of appointment , service duration) , The relationship of academic specialization of the officials of Baghdad university presidencywith their job performance . The researcher has followed the analytical descriptive mode to achieve the aims of this resear
... Show MoreInformation security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
Eight patients (3 male and 5 female) were treated in this study by Endovenous Laser Ablation (EVLA); Mathematical models are proposed to estimate the applied laser power and to assess the recovery period. The estimations of the applied laser power and recovery period in these models will be depended mainly on the diameter of the incompetent vein. In addition, Excel Program was utilized to find the proposed models. A 1470 nm diode laser up to 15W continuous power (CW) was used in the treatment of venous ulcers by EVLA procedure. Following up by duplex ultrasound was started in the 1st week after the first session until the vein is completely closed. The present study concluded that the relationship both between
... Show MoreThe exchanges in various fields,like economics, science, culture, etc., have been enhanced unceasingly among different countries around the world in the twenty-first century, thus, the university graduate who masters one foreign language does not meet the need of the labor market in most countries.So, many universities began to develop new programs to cultivate students who can use more foreign languages to serve the intercultural communication. At the same time, there is more scientific research emerged which is related to the relationship between the second and third languages. This humble research seeks to explain the relevant concepts and analyze the real data collected from Shanghai International Studies University in China, to expl
... Show MoreActive Learning And Creative Thinking