This study aims at evaluating the performance of MA students in the College of Education for Women in using the digital transformation and identifying the significant difference in performance evaluation according to the variable of academic qualification (Master or PHD). In order to achieve the aim of the research the researcher prepared a questionnaire of 20 items, and this happens after the researcher's getting acquaintance of the literature of previous studies related to the variable of the research. The apparent validity of the items was examined by exposing them to 10 juries specialized in education, psychology and evaluation and measurement. The stability of the items was examined via two methods, the test-repetition and half-division. The study was carried out on a sample of students of the higher studies in the College of Education for Women of 171 students including 28 MA student and 143 PHD students with a percentage of 85 of the research community which in origin contains 201 students of the higher studies. Through using the Weighted Average, the Relative Weight and the Unilateral Difference Analysis, the researcher came up with the following results: - It has been noted that there was a weakness for the students of higher studies in using the digital transformation, as 8 items out of 20 were achieved. These achieved items were signifying the good use of the digital transformation by the students of higher studies in in the College of Education for Women, whereas the remaining 12 items were not achieved. This signifies that the students were not efficient in using the digital transformation in their learning. According to the results that the researcher came up with, the researcher recommends carrying out training courses for the students of higher studies in using the computer and its programs and how the educational platforms are to be used to increase their competence in using the techniques of digital transformation under the supervision of specialists this field. The researcher suggested number of future studies including the evaluation of the performance of students of higher studies of the College of Education for Women in using the digital transformation and according to the instructors' viewpoints.
Student performance may influence by several factors in all his study levels such as primary school, intermediate school and even in his college; some of these factors are psychological factors, social factors, and the factors which correlate with student environment.
In this paper we study some of these factors to discover their influence by using canonical correlation analysis to analyze the data. Many conclusions are discovered to help who focuses student performance or to make it pest in future.
The subject of the Internet of Things is very important, especially at present, which is why it has attracted the attention of researchers and scientists due to its importance in human life. Through it, a person can do several things easily, accurately, and in an organized manner. The research addressed important topics, the most important of which are the concept of the Internet of Things, the history of its emergence and development, the reasons for its interest and importance, and its most prominent advantages and characteristics. The research sheds light on the structure of the Internet of Things, its structural components, and its most important components. The research dealt with the most important search engines in the Intern
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreAbstract:
The research aims to achieve defining the concept of environmental quality and associated costs. Studying the impact of environmental quality costs on the performance of economic units. Measuring the relationship between environmental quality and environmental performance of the units. Where the research problem is represented in the weak awareness of some economic units of the importance of environmental quality costs and their impact on evaluating environmental performance, and this leads to neglecting environmental considerations and not improving environmental performance effectively, which negatively affects the en
... Show MoreThe current study monitors the mechanisms of formation of the actor's performance expressive system (voice and motion) and the levels of their construction consistent with the aesthetic premise of the theatrical performance through incorporating what is natural, materialistic (physiological) and artistic and philosophical virtual (aesthetic ), through which the creative actor seeks not to repeat the image and substance of a thing according to its natural life image, in favor of new aesthetic reproduction governed by a group of significant relationships formed according to (artistic and philosophical) characteristics and features that distinguish the artistic accomplishment from its reality(its natural and functional reference). According
... Show MoreThe aim of the research to highlight the calendar of the most important tools used by the Central Bank of Iraq, in the implementation of the function of supervisory oversight, to verify the stability of the banking system, and protect the funds of shareholders, and depositors in general and the absence of any raises the risks of default and financial failure in particular, for commercial banks. The most important flaws and weaknesses in these tools, in the early detection of the risks of continuity in a timely manner, The study concluded a set of conclusions, including the weakness of the tools used in the performance of the function of supervisory oversight in detecting cases of default and financial failure in the early time as well as
... Show MoreThe science of (- - Semiology) comes in the introduction to language sciences and linguistics that addressed the levels of language building and its phonemic signs, through which we can monitor and analyze the data of the phoneme of the actor, and the ways to build his linguistic speech, especially since (the linguist Saussure - He emphasized that linguistque is only part of the science of signs, which is particularly advanced within logic, social psychology, and general psychology, and since language is in the origin - whatever language, and at what level - it is not A separate, single and unified language, in fact, they are intertwined, multiple, varied and renewed languages due to their influence The times and its development and the
... Show MoreThe study aims to identify the impact of competency-based training in its dimensions (skills, cognitive abilities, attitudes, and attitudes) in improving the performance of employees (achievement, strategic thinking and problem solving) in Jordanian university hospitals.
The study based on analytical descriptive method. The study population consisted of the Jordanian University Hospitals, the University Hospital of Jordan and the King Abdullah Hospital, as applied study case. The sample of the study consists of all upper and middle administrative employees of these hospitals; questionnaire distributed all of them and the number of valid questionnaires for analysis were 182 questionnaire.
... Show MoreThe research aims to find out the impact of Lee’s cognitive strategy on the achievement of fifth-grade literary students in the module of history. The research community consists of the secondary female day schools of Al-Karkh Al-Oula Directorate General of Education. The size of the research sample comprises (45) female students of the fifth grade of the literary brunch, (21) students for the experimental group and (24) students for the control group. The researchers have chosen an experimental design with partial control to suit the current research and its goal. They used a unified tool to measure the achievement of female students, which consisted of (50) items characterized by sincerity and they extracted the stability of t
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show More