The present research was conducted to investigate the effectiveness of a training program to improve some aspects of sensory integration disorder and its effect on self-direction among a sample of children with intellectual disabilities. The study sample consists of (10 subjects as an experimental group) were exposed to the training program، and the control group consists of (10 subjects as a control group) were not exposed to the training program. The study included the following tools: A scale of self-direction for intellectual disability (prepared by the researcher). Training program (prepared by the researcher). The Results of the study showed the following: There are no statistically significant differences between the means ranks
... Show MoreIn this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given
This research aims to shed light on some phonetic linguistic terms used in the Arabic phonetic lesson for the purpose of monitoring, analyzing and tracking its developments. Such a step helps to standardize and weigh between them. The study follows a descriptive-analytical approach; it surveys the problem of the phonetic linguistic term, and its linguistic exactness. Then, it examines some phonetic terms in the Arabic phonetic lesson, such as phonology and phonology; intensity, looseness and mediation; the production, articulatory, transition, position, and the two vocal chords. One of the most prominent conclusions of the study is that the phonetic linguistic terminology enjoyed a tangible development since its infancy, given that phone
... Show MoreIndustrial characteristics calculations concentrated on the physical properties for break down voltage in sf6, cf4 gases and their mixture with different concentrations are presented in our work. Calculations are achieved by using an improved modern code simulated on windows technique. Our results give rise to a compatible agreement with the other experimental published data.
Thin films of Zinc Selenide ZnSe have been prepared by using thermal evaporation in vacuum technique (10-5Torr) with thickness (1000, 2700, 4000) A0 and change electrode material and deposited on glass substrates with temperature (373K) and study some electrical properties at this temperature . The graphs shows linear relation between current and voltage and the results have shown increases in the value of current and electrical conductivity with increase thickness and change electrode material from Aluminum to Copper
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show More