Impact of Deep Learning Strategy in Mathematics Achievement and Practical Intelligence among High School Students
International Journal of Emerging Technologies in Learning (iJET),
Journal Year:
2023,
Volume and Issue:
18(06), P. 42 - 52
Published: March 21, 2023
—
To
identify
the
effect
of
deep
learning
strategy
on
mathematics
achievement
and
practical
intelligence
among
secondary
school
students
during
2022/2023
academic
year.
In
research,
experimental
research
method
with
two
groups
(experimental
control)
a
post-test
were
adopted.
The
community
is
represented
by
female
fifth
scientific
grade
from
first
Karkh
Education
Directorate.
(61)
intentionally
chosen,
they
divided
into
groups:
an
group
(30)
who
taught
according
to
proposed
strategy,
control
(31)
usual
method.
For
purpose
collecting
data
for
experiment,
test
was
built,
which
in
its
final
form
(25)
items
out
(20)
objective
type
both
them.
Based
findings,
studied
strategies
outperformed
those
traditional.
Language: Английский
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
International Journal of Interactive Mobile Technologies (iJIM),
Journal Year:
2023,
Volume and Issue:
17(07), P. 69 - 81
Published: April 5, 2023
User
confidentiality
protection
is
concerning
a
topic
in
control
and
monitoring
spaces.
In
image,
user's
faces
security
with
compound
information,
abused
situations,
participation
on
global
transmission
media
real-world
experiences
are
extremely
significant.
For
minifying
the
counting
needs
for
vast
size
of
image
info
time
needful
to
be
address
computationally.
consequently,
partial
encryption
user-face
picked.
This
study
focuses
large
technique
that
designed
encrypt
face
slightly.
Primarily,
dlib
utilizing
detection.
Susan
one
top
edge
detectors
valuable
localization
characteristics
marked
edges,
used
extract
features
vectors
from
user
faces.
Moreover,
relevance
suggested
generating
key
led
crucial
role
improvement
by
producing
them
as
difficult
intruders.
According
PSNR
values,
recommended
algorithms
provided
an
adequate
outcome
encryption,
they
had
lower
encrypting
duration
larger
impact.
Language: Английский
Computer Literacy with Skills of Seeking for Information Electronically among University Students
Zainab Hazim Ibrahim,
No information about this author
Ban Hassan Majeed,
No information about this author
Lina Fouad Jawad
No information about this author
et al.
International Journal of Interactive Mobile Technologies (iJIM),
Journal Year:
2023,
Volume and Issue:
17(07), P. 47 - 57
Published: April 5, 2023
Computer
literacy
is
an
urgent
necessity
for
university
students,
given
the
rapid
development
in
means
of
communication
which
we
live
this
era,
and
flow
abundant
information.
Mainly
on
computer
all
administrative
academic
transactions,
where
first
registration
semester
done
through
computer.
culture
has
many
characteristics
advantages
that
distinguish
it
from
other
sciences,
including
concept
cannot
be
defined
absolutely,
difficult
to
define
its
levels,
because
specifications
computer-educated
individual
differ
one
another,
time
also,
you
find
a
luxury
country
What,
necessary
another
country.
In
order
measure
know
level
among
computerized
scale
(40)
items
with
five
multiple-choice
alternatives
were
built.
they
have
skills
searching
information
electronically,
(21)
prepared,
five-point
Likert
was
adopted.
Results
showed
therefore
electronically
at
all.
Language: Английский
Adaptive HDR Image Blind Watermarking Approach Based on Redundant Discrete Wavelet Transform
Roa’a M. Al airaji,
No information about this author
Ibtisam A. Aljazaery,
No information about this author
Haider TH. Salim ALRikabi
No information about this author
et al.
International Journal of Interactive Mobile Technologies (iJIM),
Journal Year:
2023,
Volume and Issue:
17(10), P. 136 - 154
Published: May 22, 2023
Remarkable
success
has
been
recorded
in
the
usage
of
digital
watermarking
which
is
aimed
at
protecting
intellectual
property
multimedia
content.
In
this
paper,
a
new
tone
mapping
attack-resistant
high
dynamic
range
(HDR)
image
zero-watermarking
algorithm
proposed.
extraction
stable
and
invariant
features
are
extracted
for
efficient
through
application
redundant
discrete
wavelet
transform
(RDWT)
to
HDR
image.
The
first
step
involves
transforming
HVS
color
space,
RDWT
implemented
using
V-channel
so
that
LL
sub-band
contains
strong
structure
contents
obtained.
second
dividing
into
non-overlapping
blocks,
afterwards
subjected
process
transformation
use
singular
value
decomposition
(SVD)
U
matrix
can
be
extracted.
Third,
an
Auto-Regressive
(AR)
prediction
technique
was
employed
generating
local
relationship
model
comparison
done
facilitate
production
binary
feature
mask.
fourth
process,
hybrid
chaotic
(HCM)
used
generate
blended
watermark
security
fortified.
Lastly,
computation
effective
zero-watermark
achieved
implementation
exclusive-or
operation
on
Based
results,
approach
presented
study
demonstrated
superior
performance
terms
withstanding
TM
attacks
other
associated
with
processing.
Language: Английский
INNOVATIVE INFORMATION TECHNOLOGIES IN THE MODERNIZATION OF BUSINESS INFORMATION SUPPORT
Economic journal of Lesya Ukrainka Volyn National University,
Journal Year:
2024,
Volume and Issue:
2(38), P. 30 - 35
Published: June 18, 2024
Introduction.
Expansion
and
improvement
of
the
technology
electronic
formation
transmission
accounting
data
requires
a
review
key
principles
information
processing
systems
accounting.
Automation
primary
recording
using
modern
coding
is
great
importance
in
this
regard.
The
purpose
study
to
determine
possibilities
for
complex
use
two-dimensional
barcoding
form
QR
business
provision,
exchange,
documentation
document
flow.
Methods.
uses
historical
bibliographic
methods,
scientific
abstraction,
methods
comparative
analysis,
statistical
logical
methods.
Results.
As
part
genesis
introduction
development
its
exchange
has
been
studied.
expediency
substantiated.
Conclusions.The
advantages
ways
codes
support
have
highlighted.
New
applying
purposes
presented,
particular,
registering
movement
inventory,
payment
goods,
works,
services,
personnel
management,
access
on
website
or
other
resource,
registration
relationships
between
entities
exchanging
documents.
Language: Английский
A QR Code Used for Personal Information Based On Multi-Layer Encryption System
International Journal of Interactive Mobile Technologies (iJIM),
Journal Year:
2023,
Volume and Issue:
17(09), P. 44 - 56
Published: May 10, 2023
Protecting
and
concealing
sensitive
data
in
the
modern
world
is
challenging.
Due
to
insufficient
protection
privacy,
it
feasible
for
critical
information
be
fabricated.
This
led
a
significant
financial
loss
someone.
The
intended
recipient
must
trusted
with
able
independently
authenticate
accuracy
of
by
checking
specifics.
There
are
several
driving
rise
QR
codes
used
transmission.
their
enormous
capacity
storing
information,
vital
dissemination.
However,
most
currently
deployed
code
solutions
employ
insecure
formats
never
encryption.
Secure
Code
available
technology.
Quick
Response
(QR)
widely
accessible
without
extensive
technical
training.
Now,
user
stored
effectively
public
knowledge
occasionally
even
illegally
used.
To
address
abovementioned
issues,
this
study's
authors
propose
novel
encryption
system.
Using
image's
mathematical
processing
method,
we
may
apply
equivalence
class
principle
ordered
equations
two-dimensional
code,
producing
desired
cryptographic
result.
method
exploits
unique
visual
properties
code.
Only
reader
can
decode
code's
useful
which
too
complex
standard
reading
methods.
It
will
utilised
issues
speedy
business
client
Security,
commodity
anticounterfeiting,
bicycle
sharing
codes.
Language: Английский
Review on Arabic Handwritten Recognition Using Deep Learning and Machine Learning
Muneer Alsurori,
No information about this author
Ayedh Abdulaziz Mohsen,
No information about this author
Ghadeer Al-Badani
No information about this author
et al.
Published: Oct. 10, 2023
Recognizing
Arabic
handwriting
using
deep
learning
and
machine
is
a
contemporary
technique
in
digital
image
processing
that
has
potential
applications
ranging
from
recognition
indexing
of
texts
to
conversion
into
electronic
texts,
enhancing
the
user
experience
on
smart
devices
computers.
unique
Arabic's
use
cursive
writing
presents
challenge
for
systems
when
it
comes
identifying
handwritten
characters,
digits,
words.
This
paper
aims
discuss
challenges
recognizing
present
various
approaches
address
them.
The
research
involved
comprehensive
survey
40
papers
related
recognition,
covering
wide
range
topics
subject.
team
compared
accuracy
achieved
by
different
methods
used
these
papers,
proposed
future
work,
datasets
used.
Their
findings
reveal
highest
was
99.88%
k-NN
algorithm
combination
with
filters
such
as
HOG,
LBP,
Gabor.
approach
offers
thorough
overview
cutting-edge
recognition.
study
concludes
applying
can
achieve
high
levels
be
improve
increase
efficiency
document
processing.
main
recommendation
further
develop
algorithms
techniques
handwriting.
study's
utilized
enhance
prove
systems,
well
interest
identify
directions
development
this
field.
Language: Английский
Optimalisasi Penyuluhan Literasi Komputer sebagai Strategi Pemanfaatan Media Sosial di Banda Aceh
Nazaruddin Ali Basyah,
No information about this author
Irham Fahmi,
No information about this author
Ismail Ali
No information about this author
et al.
ABDIKAN Jurnal Pengabdian Masyarakat Bidang Sains dan Teknologi,
Journal Year:
2023,
Volume and Issue:
2(3), P. 316 - 321
Published: Aug. 28, 2023
In
today's
era,
marked
by
rapid
advancements
in
communication
methods
and
an
abundance
of
information,
computer
literacy
has
become
urgent
necessity
for
university
students.
Computers
play
a
central
role
both
administrative
academic
transactions,
starting
with
semester
registration,
which
is
primarily
conducted
online.
Computer
culture
possesses
distinctive
characteristics
advantages
that
set
it
apart
from
other
fields
study.
However,
the
concept
cannot
be
universally
defined,
its
levels
are
difficult
to
ascertain,
as
competencies
computer-educated
individuals
vary
person
over
time.
What
may
considered
luxury
one
country
deemed
another.
To
assess
gauge
level
among
students,
computerized
scale
consisting
40
items
five
multiple-choice
alternatives
was
developed.
Additionally,
21-item
created
determine
their
proficiency
electronic
information
retrieval,
utilizing
five-point
Likert
scale.
The
results
indicate
students
possess
skilled
searching
electronically.
Language: Английский