Optimalisasi Penyuluhan Literasi Komputer sebagai Strategi Pemanfaatan Media Sosial di Banda Aceh DOI Creative Commons

Nazaruddin Ali Basyah,

Irham Fahmi,

Ismail Ali

et al.

ABDIKAN Jurnal Pengabdian Masyarakat Bidang Sains dan Teknologi, Journal Year: 2023, Volume and Issue: 2(3), P. 316 - 321

Published: Aug. 28, 2023

In today's era, marked by rapid advancements in communication methods and an abundance of information, computer literacy has become urgent necessity for university students. Computers play a central role both administrative academic transactions, starting with semester registration, which is primarily conducted online. Computer culture possesses distinctive characteristics advantages that set it apart from other fields study. However, the concept cannot be universally defined, its levels are difficult to ascertain, as competencies computer-educated individuals vary person over time. What may considered luxury one country deemed another. To assess gauge level among students, computerized scale consisting 40 items five multiple-choice alternatives was developed. Additionally, 21-item created determine their proficiency electronic information retrieval, utilizing five-point Likert scale. The results indicate students possess skilled searching electronically.

Language: Английский

Impact of Deep Learning Strategy in Mathematics Achievement and Practical Intelligence among High School Students DOI Open Access

Sabah Saeed Hammadi,

Ban Hassan Majeed, Areej Khuder Hassan

et al.

International Journal of Emerging Technologies in Learning (iJET), Journal Year: 2023, Volume and Issue: 18(06), P. 42 - 52

Published: March 21, 2023

— To identify the effect of deep learning strategy on mathematics achievement and practical intelligence among secondary school students during 2022/2023 academic year. In research, experimental research method with two groups (experimental control) a post-test were adopted. The community is represented by female fifth scientific grade from first Karkh Education Directorate. (61) intentionally chosen, they divided into groups: an group (30) who taught according to proposed strategy, control (31) usual method. For purpose collecting data for experiment, test was built, which in its final form (25) items out (20) objective type both them. Based findings, studied strategies outperformed those traditional.

Language: Английский

Citations

13

A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection DOI Open Access

Raghad Abdulaali Azeez,

Abeer Salim Jamil, Mohammed Salih Mahdi

et al.

International Journal of Interactive Mobile Technologies (iJIM), Journal Year: 2023, Volume and Issue: 17(07), P. 69 - 81

Published: April 5, 2023

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security with compound information, abused situations, participation on global transmission media real-world experiences are extremely significant. For minifying the counting needs for vast size of image info time needful to be address computationally. consequently, partial encryption user-face picked. This study focuses large technique that designed encrypt face slightly. Primarily, dlib utilizing detection. Susan one top edge detectors valuable localization characteristics marked edges, used extract features vectors from user faces. Moreover, relevance suggested generating key led crucial role improvement by producing them as difficult intruders. According PSNR values, recommended algorithms provided an adequate outcome encryption, they had lower encrypting duration larger impact.

Language: Английский

Citations

5

Computer Literacy with Skills of Seeking for Information Electronically among University Students DOI Open Access

Zainab Hazim Ibrahim,

Ban Hassan Majeed,

Lina Fouad Jawad

et al.

International Journal of Interactive Mobile Technologies (iJIM), Journal Year: 2023, Volume and Issue: 17(07), P. 47 - 57

Published: April 5, 2023

Computer literacy is an urgent necessity for university students, given the rapid development in means of communication which we live this era, and flow abundant information. Mainly on computer all administrative academic transactions, where first registration semester done through computer. culture has many characteristics advantages that distinguish it from other sciences, including concept cannot be defined absolutely, difficult to define its levels, because specifications computer-educated individual differ one another, time also, you find a luxury country What, necessary another country. In order measure know level among computerized scale (40) items with five multiple-choice alternatives were built. they have skills searching information electronically, (21) prepared, five-point Likert was adopted. Results showed therefore electronically at all.

Language: Английский

Citations

4

Adaptive HDR Image Blind Watermarking Approach Based on Redundant Discrete Wavelet Transform DOI Open Access

Roa’a M. Al airaji,

Ibtisam A. Aljazaery,

Haider TH. Salim ALRikabi

et al.

International Journal of Interactive Mobile Technologies (iJIM), Journal Year: 2023, Volume and Issue: 17(10), P. 136 - 154

Published: May 22, 2023

Remarkable success has been recorded in the usage of digital watermarking which is aimed at protecting intellectual property multimedia content. In this paper, a new tone mapping attack-resistant high dynamic range (HDR) image zero-watermarking algorithm proposed. extraction stable and invariant features are extracted for efficient through application redundant discrete wavelet transform (RDWT) to HDR image. The first step involves transforming HVS color space, RDWT implemented using V-channel so that LL sub-band contains strong structure contents obtained. second dividing into non-overlapping blocks, afterwards subjected process transformation use singular value decomposition (SVD) U matrix can be extracted. Third, an Auto-Regressive (AR) prediction technique was employed generating local relationship model comparison done facilitate production binary feature mask. fourth process, hybrid chaotic (HCM) used generate blended watermark security fortified. Lastly, computation effective zero-watermark achieved implementation exclusive-or operation on Based results, approach presented study demonstrated superior performance terms withstanding TM attacks other associated with processing.

Language: Английский

Citations

4

INNOVATIVE INFORMATION TECHNOLOGIES IN THE MODERNIZATION OF BUSINESS INFORMATION SUPPORT DOI Creative Commons
Iryna Nazarova

Economic journal of Lesya Ukrainka Volyn National University, Journal Year: 2024, Volume and Issue: 2(38), P. 30 - 35

Published: June 18, 2024

Introduction. Expansion and improvement of the technology electronic formation transmission accounting data requires a review key principles information processing systems accounting. Automation primary recording using modern coding is great importance in this regard. The purpose study to determine possibilities for complex use two-dimensional barcoding form QR business provision, exchange, documentation document flow. Methods. uses historical bibliographic methods, scientific abstraction, methods comparative analysis, statistical logical methods. Results. As part genesis introduction development its exchange has been studied. expediency substantiated. Conclusions.The advantages ways codes support have highlighted. New applying purposes presented, particular, registering movement inventory, payment goods, works, services, personnel management, access on website or other resource, registration relationships between entities exchanging documents.

Language: Английский

Citations

0

A QR Code Used for Personal Information Based On Multi-Layer Encryption System DOI Open Access
Haroon Rashid Hammood Al Dallal,

Wijdan Noaman Marzoog Al Mukhtar

International Journal of Interactive Mobile Technologies (iJIM), Journal Year: 2023, Volume and Issue: 17(09), P. 44 - 56

Published: May 10, 2023

Protecting and concealing sensitive data in the modern world is challenging. Due to insufficient protection privacy, it feasible for critical information be fabricated. This led a significant financial loss someone. The intended recipient must trusted with able independently authenticate accuracy of by checking specifics. There are several driving rise QR codes used transmission. their enormous capacity storing information, vital dissemination. However, most currently deployed code solutions employ insecure formats never encryption. Secure Code available technology. Quick Response (QR) widely accessible without extensive technical training. Now, user stored effectively public knowledge occasionally even illegally used. To address abovementioned issues, this study's authors propose novel encryption system. Using image's mathematical processing method, we may apply equivalence class principle ordered equations two-dimensional code, producing desired cryptographic result. method exploits unique visual properties code. Only reader can decode code's useful which too complex standard reading methods. It will utilised issues speedy business client Security, commodity anticounterfeiting, bicycle sharing codes.

Language: Английский

Citations

1

Review on Arabic Handwritten Recognition Using Deep Learning and Machine Learning DOI

Muneer Alsurori,

‪Ayedh Abdulaziz Mohsen‬‏,

Ghadeer Al-Badani

et al.

Published: Oct. 10, 2023

Recognizing Arabic handwriting using deep learning and machine is a contemporary technique in digital image processing that has potential applications ranging from recognition indexing of texts to conversion into electronic texts, enhancing the user experience on smart devices computers. unique Arabic's use cursive writing presents challenge for systems when it comes identifying handwritten characters, digits, words. This paper aims discuss challenges recognizing present various approaches address them. The research involved comprehensive survey 40 papers related recognition, covering wide range topics subject. team compared accuracy achieved by different methods used these papers, proposed future work, datasets used. Their findings reveal highest was 99.88% k-NN algorithm combination with filters such as HOG, LBP, Gabor. approach offers thorough overview cutting-edge recognition. study concludes applying can achieve high levels be improve increase efficiency document processing. main recommendation further develop algorithms techniques handwriting. study's utilized enhance prove systems, well interest identify directions development this field.

Language: Английский

Citations

0

Optimalisasi Penyuluhan Literasi Komputer sebagai Strategi Pemanfaatan Media Sosial di Banda Aceh DOI Creative Commons

Nazaruddin Ali Basyah,

Irham Fahmi,

Ismail Ali

et al.

ABDIKAN Jurnal Pengabdian Masyarakat Bidang Sains dan Teknologi, Journal Year: 2023, Volume and Issue: 2(3), P. 316 - 321

Published: Aug. 28, 2023

In today's era, marked by rapid advancements in communication methods and an abundance of information, computer literacy has become urgent necessity for university students. Computers play a central role both administrative academic transactions, starting with semester registration, which is primarily conducted online. Computer culture possesses distinctive characteristics advantages that set it apart from other fields study. However, the concept cannot be universally defined, its levels are difficult to ascertain, as competencies computer-educated individuals vary person over time. What may considered luxury one country deemed another. To assess gauge level among students, computerized scale consisting 40 items five multiple-choice alternatives was developed. Additionally, 21-item created determine their proficiency electronic information retrieval, utilizing five-point Likert scale. The results indicate students possess skilled searching electronically.

Language: Английский

Citations

0