هدفت هذه الدراسة إلى تحليل نتائج الاختبار الوطني الموحد الذي تطبقه وزارة التربية والتعليم الفلسطينية في مادة الرياضيات لطلبة الصف الثامن الأساسي في المدارس الحكومية في محافظة طولكرم، وذلك لمعرفة مستوى الطلبة على هذا الاختبار في ضوء متغيرات الجنس والمنطقة التعليمية ونوع المدرسة، ومعرفة علاقة التحصيل على هذا الاختبار بتحصيل الطلبة المدرسي والمعدل العام. ولتحقيق ذلك تم تحليل درجات (3218) طالباً وطالبة؛ وهم يمثلون مجتمع الدراسة بالكامل الذين تقدموا للاختبار الوطني الموحد في مقرر الرياضيات للفصل الدراسي الأول من العام الدراسي (2012/2013)، وهم موزعين إلى (103) شعبة دراسية في المدارس الحكومية التابعة لمديرية التربية والتعليم في محافظة طولكرم. وقد أظهرت نتائج الدراسة أن نسبة النجاح الكلية على الاختبار الوزاري الموحد في الرياضيات كانت ضعيفة حيث بلغت (4. 27%)، وقد ظهر هذا الضعف على جميع مجالات الرياضيات. وكان تحصيل الطلبة على الأهداف من مستوى التذكر والمعرفة أعلى منه في تحصيلهم على أهداف التطبيق والتحليل والاستدلال. كما أظهرت نتائج الدراسة وجود فروق جوهرية في مستوى تحصيل الطلبة على هذا الاختبار تبعاً لمتغيرات الجنس لصالح الإناث، ونوع المدرسة لصالح مدارس الإناث ثم المختلطة، بينما عدم وجود فروق دالة إحصائياً تبعاً لمتغير المنطقة التعليمية، وأظهرت النتائج أيضاً وجود علاقة جوهرية بين درجات تحصيل الطلبة على الاختبار الوزاري الموحد في مادة الرياضيات ودرجاتهم التحصيلية الفصيلة للماد نفسها وبين تحصيلهم العام الممثل بالمعدل الفصلي في المواد الدراسية جميعها.
Become organizations today can not withstand the competitive challenges and constant change in the business environment , as well as the pressures witnessed by the Iraqi environment , especially in recent years such as the opening of the market which increased ambitious organizations and desire to secure the experiences superior to the survival and expansion of the competitive environment , prompting attention to the subject of vital contemporary is emotional Marketing and measure its impact on the customer experience in the sector of the economy is important and is the financial sector , so there is a need to study this term in the Iraqi organizations and try to diagnose the extent of implementation of the study sample emo
... Show MoreObjective: To identify the role and importance of the clinical pharmacist in the Emergency Department on prevent
or reduced the medication error.
Methodology: We collected the medical file of 3400 patients, 1400 patient's file in (A) hospital, and 1000 patient's
file in each of (B and C) hospital, who admitted to the ED, at primary weekdays between 8 am to 2 pm, and
recorded all the intervention made by clinical pharmacist through an active search in clinical charts, with analysis
of the daily medical prescription. The potential severity of harm of the medication error judged by two reviewers,
a permanent emergency physician, and clinical pharmacist based on the National Coordinating Council (NCC) of
Medication Error
This study aims to investigate the academic leaders’ perceptions towards the degree of availability of the dimensions of organizational immunity systems at the University of Tabuk, as well as to reveal the statistically significant differences between the average responses of the study sample members about the degree of availability of these dimensions at their university due to the variables of (gender, leadership position, and college specialization). To achieve the objectives of the study, a descriptive survey method was used. The study population consisted of (200) male and female leaders who were academic leaders at the University of Tabuk. A questionnaire was used as a tool for collecting data, which its validity and reliability
... Show MoreThis work is concerned with building a three-dimensional (3D) ab-initio models that is capable of predicting the thermal distribution of laser direct joining processes between Polymethylmethacrylate (PMMA) and stainless steel 304(st.st.304). ANSYS® simulation based on finite element analysis (FEA) was implemented for materials joining in two modes; laser transmission joining (LTJ) and conduction joining (CJ). ANSYS® simulator was used to explore the thermal environment of the joints during joining (heating time) and after joining (cooling time). For both modes, the investigation is carried out when the laser spot is at the middle of the joint width, at 15 mm from the commencement point (joint edge) at traveling time of 3.75 s. Process par
... Show MoreNowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MorePVC membrane sensor for the selective determination of Mefenamic acid (MFA) was constructed. The sensor is based on ion association of MFA with Dodecaphospho molybdic acid (PMA) and Dodeca–Tungstophosphoric acid(PTA) as ion pairs. Nitro benzene (NB) and di-butyl phthalate (DBPH) were used as plasticizing agents in PVC matrix membranes. The specification of sensor based on PMA showed a linear response of a concentration range 1.0 × 10–2 –1.0 × 10–5 M, Nernstian slopes of 17.1-18.86 mV/ decade, detection limit of 7 × 10-5 -9.5 × 10 -7M, pH range 3 – 8 , with correlation coefficients lying between 0.9992 and 0.9976, respectively. By using the ionphore based on PTA gives a concentration range of 1.0 × 10–4 –1.0 × 10–5 M,
... Show MorePorosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreThis research aims to choose the appropriate probability distribution to the reliability analysis for an item through collected data for operating and stoppage time of the case study.
Appropriate choice for .probability distribution is when the data look to be on or close the form fitting line for probability plot and test the data for goodness of fit .
Minitab’s 17 software was used for this purpose after arranging collected data and setting it in the the program.
&nb
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More