The research aims to identify the effect of using the strategy of Roundhouse on the achievement of fourth-grade students of computer and their Attitudes towards it. The research sample consisted of (61) fourth-grade secondary school students distributed into the experimental group consisted of (31) students study computer according to the Roundhouse strategy, and the control group consisted of (30) students follow the traditional method. The researcher designed an achievement test consisting of (30) items of multiple choice. To measure the attitudes of students towards the computer, a questionnaire of (32) paragraphs with three alternatives was designed by the researcher. The results showed that there is a statistically significant difference between the scores of the two research groups in the achievement test of the computer for the benefit of the experimental group. The results also showed a statistically significant difference between the scores of the two groups in the attitudes scale for the benefit of the experimental group.
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreAn annular two-phase, steady and unsteady, flow model in which a conductingfluid flow under the action of magnetic field is concavely. Two models arepresented, in the model one; the magnetic field is perpendicular to the long side ofthe channel, while in the model two is perpendicular to the short side. Also, westudy, to some extent the single-phase liquid flow.It is found that the motion and heat transfer equations are controlled by differentdimensionless parameters namely, Reynolds, Hartmann, Prandtl, and Poiseuilleparameters. The Laplace transform technique is used to solve each of the motion andheat transfer equations. The effects of each of dimensionless parameters upon thevelocity and heat transfer is analyzed.A comprehensive study fo
... Show MoreBackground: Skull secondary tumors are malignant bone tumors which are increasing in incidence.Objective: The objectives of this study were to present clinical features , asses the outcome of patients with secondary skull tumors ,characterize the MRI features, locations, and extent of secondary skull tumors to determine the frequency of the symptomatic disease.Type of the study: This is a prospective study.Methods: This is a prospective study from February 2000 to February 2008. The patients were selected from five neurosurgical centers and one oncology hospital in Baghdad/Iraq. The inclusion criteria were MRI study of the head(either as an initial radiological study or following head CT scan when secondary brain tumor is suspected , vis
... Show MoreThe paper deals with a study of peculiarities of gluttonic text structures in the Arabic-Russian language pair at the sociolinguistic, system structural, functional-stylistic and lexico-semantic aspects from the standpoint of view at functional approach to the phenomena of language systems and the gluttonic discourse as a special type of ver bal and social discourse. Profound attention is paid to the consideration of lexical and grammatical means of explication of glutton discourse on the examples of identi cal Arabic and Russian literary texts as well as language situations in Arab countries and Russia, features of which are due to the characteristics of gluttonic discourses that reflect the features of the two different ethnolingual cu
... Show MoreThis work implements an Electroencephalogram (EEG) signal classifier. The implemented method uses Orthogonal Polynomials (OP) to convert the EEG signal samples to moments. A Sparse Filter (SF) reduces the number of converted moments to increase the classification accuracy. A Support Vector Machine (SVM) is used to classify the reduced moments between two classes. The proposed method’s performance is tested and compared with two methods by using two datasets. The datasets are divided into 80% for training and 20% for testing, with 5 -fold used for cross-validation. The results show that this method overcomes the accuracy of other methods. The proposed method’s best accuracy is 95.6% and 99.5%, respectively. Finally, from the results, it
... Show MoreThe fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show MoreThe design, synthesis, and characterization of a star shaped 2,4,6-tris-(4`-carboxyphenoxy)-1,3,5-triazine liquid crystalline with columnar discotic mesophase properties establish H-bond interactions with 3,5-dialkoxypyidine were reported. The structures of the synthesized compounds were actually determined by elementary analysis, and FT-IR, ¹HNMR, ¹³CNMR, and mass spectroscopy. The mesomorphic properties of these mesogens were examined using differential scanning calorimetry (DSC) and optical polarizing microscopy (OPM). The synthesized molecules exhibited enantiotropic hexagonal columnar liquid crystal, which depends for the H- bond complex in a 1:3 ratio.
The aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive
... Show MoreIn this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database