Preferred Language
Articles
/
jperc-1060
Goal Conflict among Twelfth-Grade Students based on Gender and Major
...Show More Authors

The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of power and incompatible strategies) showed lower conflict. The ANOVA analysis showed no differences according to specialization, and interaction between gender and specialization. However, the differences were observed according to gender in “limit of budget” and “unclear task”. Recommendations are discussed.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Journal Of Composites Science
The Influence of Strontium Oxide on the Physio-Mechanical Properties of Biomedical-Grade Titanium in Ti-SrO Composites
...Show More Authors

Dental implants can be made of various materials, and amongst them, titanium and titanium alloy were the materials of choice for dental implants for many years because of their biocompatibility. The two alloys have a high level of biocompatibility, a lower modulus of elasticity, and better corrosion resistance than other alloys. Thus, they are frequently utilized in biomedical applications and mostly replace stiff fabrics. The latest advances in a new strontium oxide–cp titanium composite alloy are the main topic of this research. With regard to biomedical applications, additions of strontium oxide were synthesized at three distinct weight percentages (2%, 4%, and 6% by wt%). Powder metallurgy was used to create the alloys, which

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Audio Classification Based on Content Features
...Show More Authors

Audio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
A steganography based on orthogonal moments
...Show More Authors

View Publication
Scopus (30)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Tue Jan 09 2024
Journal Name
Psychology And Education
Longevity of hope, its causes, effects, and treatments in light of the Qur'n and Hadith
...Show More Authors

This study came to show the importance of long hope and its extent on human life, and I found that through the research, the majority of the scholars did not address this topic separately, and did not explain the travails of this situation and the worldly problems it causes to its owner, and the consequences that fall upon it in the hereafter. Most of the studies inside of the books consisted of a simple presentation of this problem and an explanation of the remedies that came to us from the Qur'an and the hadiths and the Sunnah, and on the sayings of the imams of guidance (may the best prayers and peace be upon them), and on the chosen companions and followers, may God be pleased with them, but the length of hope does not stop At a certain

... Show More
View Publication
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Tracked Robot Control with Hand Gesture Based on MediaPipe
...Show More Authors

Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Mon Apr 01 2019
Journal Name
مجلة البحوث التربوية والنفسية
تحليل محتوى كتاب الحاسوب للصف الثاني المتوسط وفق القيم العلميةوالأخلاقية
...Show More Authors

يهدف هذا البحث الى تصميم قائمة بمؤشرات القيم العلمية والاخلاقية التي ينبغي توافرها في محتوى كتاب الحاسوب للصف الثاني المتوسط، وتحليل محتوى الكتاب المذكور آنفاً وفقاً لها، وذلك عن طريق الإجابة عن السؤال الآتي: ما نسبة توافر القيم العلمية والأخلاقية في محتوى كتاب الحاسوب المُعد لطلبة الصف الثاني المتوسط الصادر من وزارة التربية العراقية/ المديرية العامة للمناهج في العام الدراسي ( 2017-2018) م؟ ولتحقيق هدفا البحث أ

... Show More
Crossref
Publication Date
Sun Apr 01 2007
Journal Name
Journal Of Educational And Psychological Researches
حل المسألة الرياضية اللفظية وعلاقتها بأسلوب الصياغة ونوع المطلوب فيها لدى تلاميذ الصف السادس الابتدائي
...Show More Authors

تشهد مناهج الرياضيات تطورا ملحوظا على المستوين المحلي والعالمي, تلبية لمتطلبات العصر ومواجهة تحدياته, وماسيفرضه من تطورات وتجديدات لاحقة لذلك عقدت كثير من المؤتمرات واجريت العديد من الدراسات والبحوث في مجال تعلم وتعليم الرياضيات على المستوين الاقليمي والعالمي, فقد ركزت تلك المؤترات والدراسات على العديد من التوصيات التي اصبحت فيما بعد بمثابة اتجاهات حديثة لتعليم وتعلم الرياضيات, لمواكبة التطور الحاص

... Show More
View Publication Preview PDF