The effects of Internet use on university’s students:The effects of Internet use on university’s students:“A Study on a Sample of Jordanian University’s students "This survey aims to identify the most important effects of Internet use on Jordanian public and private universities’ students by monitoring and analyzing a set of indicators that show the quality of the effects on specific fields such as cultural, social, psychological, moral and political effects .To achieve these goals, the study attempts to answer the following questions:1. What are the effects of Internet’s use on students?2. What is the relationship between the effects and demographic variables such as gender, age, family size and academic level and specialization. The population of our study is four public and private Jordanian universities. The questionnaire was distributed to study population in various specialties in all colleges of the universities by using available sample . The sample of the study was 891students . The males sample was( 55.22%) while the females sample was (44.78%( The data were analyzed by using descriptive statistical and analytical statistical measures by using the Statistical Package for Social Sciences (SPSS). The study has discussed the types of the effects of the internet on our samples in the following fields: cognitive and scientific influences, social and recreational influences, psychological effects, value effects, political influences, negative effects.It is clear that the "effect fields" of the Internet use on university’s students have high internal consistency values.In the field of "negative effects" the stability values ranged between (0.782) and (0.883) , And for the field of "value effects" indicate appropriate stability values.The results showed that the mean field of the "effects of Internet use" for university’s students was achieved to a medium extent. The mean of this field (2.01) was of relative importance (67.0). The level of all fields as a whole was average. The mathematical mean ranged from 1.90 to 2.23. In the first place was the "cognitive and scientific influences" with a mean of (2.23) and a relative importance (74.33). The social and recreational influences ranked second with a mean of 2.06 and a relative importance of 68.67. Internet use is observed to be medium, with average (1.94) relative importance (64.67), Finally, the "value effects" came with a mean (1.90) with relative importance (63.33).The results also indicate that "global electronic sites " are in the first rank electronic sites to be visited by the students , followed by "Arab sites" while "local sites" came in last rank. It indicates that the majority of students have a particular site they visit frequently.
The current research aims to find out the extent to which students of the Faculty of Education for Pure Sciences\/Ibn al-Haitham have owned laboratory academic skills, the researcher adopted a descriptive research approach to conform to the goal of the research, the research sample the consisted of 140 students from the Department of Chemistry Phase II, The research tool, which consisted of a measure of laboratory academic skills, which consisted of seven skills and consisted of 28 paragraphs (four paragraphs per field), was prepared and the pent-up scale was chosen because the selected sample were university students, and the results showed the ownership of students' skills of laboratory academic skills other than skill The use of the libr
... Show MoreThe present study develops the sorption model for simulating the effects of pH and temperature on the uptake of cadmium from contaminated water using waste foundry sand (WFS) by allowing the variation of the maximum adsorption capacity and affinity constant. The presence of two acidic functional groups with the same or different affinity is the basis in the derivation of the two models; Model 1 and Model 2 respectively. The developed Bi-Langmuir model with different affinity (Model 2) has a remarkable ability in the description of process under consideration with coefficient of determination > 0.9838 and sum of squared error < 0.08514. This result is proved by FTIR test where the weak acids responsible of cadmium ions removal
... Show MoreKamil, S.H. 2024. Effects of Aqueous and Alcoholic Extracts of Lemongrass, Cymbopogon citratus on Some Biological Aspects of the Fig Moth, Ephestia cautella. Arab Journal of Plant Protection, 42(3): 377-381. https://doi.org/10.22268/AJPP-001245 This study evaluated the effects of aqueous and ethanolic extracts of lemongrass on the third instar larvae of the date moth Ephestia cautella Walker (Lepidoptera: Pyralidae). The results obtained showed that there were toxic effects of aqueous extract, which produced the highest mortality rate of 43.35% at 5% concentration72 hours after treatment, whereas the lowest mortality rate of 17% was obtained at 0.5% concentration, 72 hours after treatment. The LC50 was 0.082%. The results indicated
... Show MoreAbstract
This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More