Preferred Language
Articles
/
abaa-111
The effects of Internet use on university’s students: “A Study on a Sample of Jordanian University’s students "
...Show More Authors

The effects of Internet use on university’s students:The effects of Internet use on university’s students:“A Study on a Sample of Jordanian University’s students "This survey aims to identify the most important effects of Internet use on Jordanian public and private universities’ students by monitoring and analyzing a set of indicators that show the quality of the effects on specific fields such as  cultural, social, psychological, moral and political effects .To achieve these goals, the study attempts to answer the following questions:1.   What are the effects of Internet’s use on students?2. What is   the relationship between the effects and demographic variables such as  gender, age, family size and academic level and specialization.  The  population of our study is four public and private Jordanian universities. The questionnaire was distributed to  study population in various specialties in all colleges of the universities by using available sample  . The sample of the study was 891students . The males sample was(   55.22%) while the females sample was   (44.78%( The data were analyzed by using descriptive statistical and analytical statistical measures by using the Statistical Package for Social Sciences (SPSS). The study has discussed the types of the effects of the internet on our  samples in the following fields: cognitive and scientific influences, social and recreational influences, psychological effects, value effects, political influences, negative effects.It is clear that the "effect fields" of the Internet use  on university’s students have high internal consistency values.In the field of "negative effects" the stability values ranged between (0.782) and (0.883) , And for the field of "value effects" indicate appropriate stability values.The results showed that the mean field of the "effects of Internet use" for university’s students  was achieved to a medium extent. The mean of this field (2.01) was of relative importance (67.0). The level of all fields as a whole was average. The mathematical mean ranged from 1.90 to 2.23. In the first place was the   "cognitive and scientific influences" with a mean of (2.23) and a relative importance (74.33). The social and recreational influences ranked second with a mean of 2.06 and a relative importance of 68.67. Internet use is observed to be medium, with average   (1.94) relative importance (64.67), Finally, the "value effects" came with a mean (1.90) with relative importance (63.33).The results also indicate that "global electronic sites " are in the first rank electronic sites to be visited by the students , followed by "Arab sites" while "local sites" came in  last rank. It indicates that the majority of students have a particular site they visit frequently.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
American Journal Of Pharmaceutical Education
Exploring Electronic Communication Modes Between Iraqi Faculty and Students of Pharmacy Schools Using the Technology Acceptance Model
...Show More Authors

View Publication
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Fri Mar 20 2020
Journal Name
Journal Of Xi'an University Of Architecture & Technology
Academic Laboratory Skills For Chemistry Students at the College of Education For Pure Sciences -Ibn Al Haitham
...Show More Authors

The current research aims to find out the extent to which students of the Faculty of Education for Pure Sciences\/Ibn al-Haitham have owned laboratory academic skills, the researcher adopted a descriptive research approach to conform to the goal of the research, the research sample the consisted of 140 students from the Department of Chemistry Phase II, The research tool, which consisted of a measure of laboratory academic skills, which consisted of seven skills and consisted of 28 paragraphs (four paragraphs per field), was prepared and the pent-up scale was chosen because the selected sample were university students, and the results showed the ownership of students' skills of laboratory academic skills other than skill The use of the libr

... Show More
Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The attitude of Arabic - Islamic caliphate toward the A raab in the prophet and rightly guided caliphate
...Show More Authors

0

View Publication Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
Environmental Engineering Research
Development of Bi-Langmuir model on the sorption of cadmium onto waste foundry sand: Effects of initial pH and temperature
...Show More Authors

The present study develops the sorption model for simulating the effects of pH and temperature on the uptake of cadmium from contaminated water using waste foundry sand (WFS) by allowing the variation of the maximum adsorption capacity and affinity constant. The presence of two acidic functional groups with the same or different affinity is the basis in the derivation of the two models; Model 1 and Model 2 respectively. The developed Bi-Langmuir model with different affinity (Model 2) has a remarkable ability in the description of process under consideration with coefficient of determination > 0.9838 and sum of squared error < 0.08514. This result is proved by FTIR test where the weak acids responsible of cadmium ions removal

... Show More
Scopus (34)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Arab Journal For Plant Protection
Effects of Aqueous and Alcoholic Extracts of Lemongrass, Cymbopogon citratus on Some Biological Aspects of the Fig Moth, Ephestia cautella
...Show More Authors

Kamil, S.H. 2024. Effects of Aqueous and Alcoholic Extracts of Lemongrass, Cymbopogon citratus on Some Biological Aspects of the Fig Moth, Ephestia cautella. Arab Journal of Plant Protection, 42(3): 377-381. https://doi.org/10.22268/AJPP-001245 This study evaluated the effects of aqueous and ethanolic extracts of lemongrass on the third instar larvae of the date moth Ephestia cautella Walker (Lepidoptera: Pyralidae). The results obtained showed that there were toxic effects of aqueous extract, which produced the highest mortality rate of 43.35% at 5% concentration72 hours after treatment, whereas the lowest mortality rate of 17% was obtained at 0.5% concentration, 72 hours after treatment. The LC50 was 0.082%. The results indicated

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Dec 12 2017
Journal Name
Al-khwarizmi Engineering Journal
Model Reference Adaptive Control based on a Self-Recurrent Wavelet Neural Network Utilizing Micro Artificial Immune Systems
...Show More Authors

Abstract 

This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Computing And Information Technology
A Survey on Emotion Recognition for Human Robot Interaction
...Show More Authors

With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref