The learner has face difficult in learning if not accompanied by strong motivation and directed towards the goals that set for himself,as the type of goals set by the learner for himself is behind the difference in achievement of the tasks and levels of learning, and these goals are directed and determine his behavior Academic in the way of his study and his direction towards the lecture and colleagues.
Current research aims:
- Build tools for thegoal orientations
- Measuring the goal orientations for the university studentsaccording to variables (type/class/specialization).
In order to achieve the objectives of the research, a tool was constructed for the (the Goal orientation), and the psych
... Show MoreIn this paper, membrane-based computing image segmentation, both region-based and edge-based, is proposed for medical images that involve two types of neighborhood relations between pixels. These neighborhood relations—namely, 4-adjacency and 8-adjacency of a membrane computing approach—construct a family of tissue-like P systems for segmenting actual 2D medical images in a constant number of steps; the two types of adjacency were compared using different hardware platforms. The process involves the generation of membrane-based segmentation rules for 2D medical images. The rules are written in the P-Lingua format and appended to the input image for visualization. The findings show that the neighborhood relations between pixels o
... Show MoreThe deficit of the federal budget and the structural imbalances suffered by the Iraqi economy has affected the direction of research towards suggesting steps and mechanisms can be relied upon in the near term to form a broader base of non-oil revenues aimed at achieving a balanced budget, and to proceed to reform the financial situation, In reducing their financial dictates, whether capital or operational, which lead to significant financial and economic consequences. This also requires that the Iraqi political elite have the real will, strategic vision and full awareness that the implementation of these reforms has potential social and economic effects, with long-term measures to be taken. The aim is not only to reform the finan
... Show MoreThis research was aimed to study the efficiency of microfiltration membranes for the treatment of oily wastewater and the factors affecting the performance of the microfiltration membranes experimental work were includes operating the microfiltration process using polypropylene membrane (1 micron) and ceramic membrane (0.5 micron) constructed as candle; two methods of operation were examined: dead end and cross flow. The oil emulsion was prepared using two types of oils: vegetable oil and motor oil (classic oil 20W-50). The operating parameters studied are: feed oil concentration 50 – 800 mg/l, feed flow rate 10 – 40 l/h, and temperature 30 – 50 oC, for dead end and cross flow microfiltration.
It was found that water flux decrea
Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with
... Show MoreThe basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P
... Show MoreIn this study, an approach inspired by a standardized calibration method was used to test a laser distance meter (LDM). A laser distance sensor (LDS) was tested with respect to an LDM and then a statistical indicator explained that the former functions in a similar manner as the latter. Also, regression terms were used to estimate the additive error and scale the correction of the sensors. The specified distance was divided into several parts with percent of longest one and observed using two sensors, left and right. These sensors were evaluated by using the regression between the measured and the reference values. The results were computed using MINITAB 17 package software and excel office package. The accuracy of the results in this wo
... Show MoreThe method of operational matrices based on different types of polynomials such as Bernstein, shifted Legendre and Bernoulli polynomials will be presented and implemented to solve the nonlinear Blasius equations approximately. The nonlinear differential equation will be converted into a system of nonlinear algebraic equations that can be solved using Mathematica®12. The efficiency of these methods has been studied by calculating the maximum error remainder ( ), and it was found that their efficiency increases as the polynomial degree (n) increases, since the errors decrease. Moreover, the approximate solutions obtained by the proposed methods are compared with the solution of the 4th order Runge-Kutta meth
... Show MoreDeepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show More