The main purpose of the present research is to identify emotional intelligence for college students and its relation to gender (male-female) , and to identify shyness for college students and its relation to gender(male-female)and to identify the relationship between emotional intelligence and shyness. The sample of the present research consisted of (200) college students , (100)male students and (100)female students randomly selected. scale for measuring emotional intelligence as prepared consists of (46) items according to Golmans theory distributed into five subscales and these are : (self-awareness , emotion management, motivation, sympathy and social skills) and Alobaidi shyness scale is used to assess shyness and it consist
... Show MoreEl español es una lengua hablada por una ingente comunidad que abarca varios cientos de millones de personas. Son muchas las palabras con distintos significados que se escriben de similar manera. Hablamos, por ejemplo, de dos de ellas: el adjetivo solo y el adverbio sólo.
En este trabajo se plantea un estudio del adverbio sólo, palabra invariable cuya función consiste en (complementar la significación del verbo) y solo es un adjetivo (califica a un sustantivo).¿Cómo diferenciarlas para evitar errores ortográficos? Así, en estos casos (solo/ sólo), la distinción la da la tilde en la primera vocal. Ésta es la
... Show MoreThe concept of self is considered one of the important dimensions in the human personality, because feeling of self is an important characteristic in this phase from the psychological point of view.
The first source which forms the concept of self is the physical image, where the built and appearance of the body is considered among the vital matters which determine the person's image of himself/herself.
The current research aims to:
1) Identify the level of physical self concept at the kindergarten children.
2) Identify the level of psychological self concept at the kindergarten children.
3) Iden
... Show MoreThis research provides a new method to study praise poetry that can be used as a course to teach English and Arabic to students in the College of Education. This research answers two questions:
- Is it possible to examine praise poetry as a tagmeme?
- Is this analysis of great help in teaching English and Arabic to students in the College of Education?
The data that will be chosen for the purpose of analysis are two of Shakespeare's sonnets and two of AL Mulik's poems. The sonnets selected for this purpose are 17 and 18. AL Mulik's poems selected for the same purpose are 8 and 9.
&nbs
... Show MoreThe aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di
... Show MoreIslamic civilization derived its religious law from Quran and sunnah which took care of human as a benefit person in life and how it treat with it , and because the civilization takes care of human , it would take also in his health , manners ,body and this is the aim of Islamic civilization ,all religious emphasize on Islamic laws and on helping poor people or weakness one.
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreAbstract
The decision maker needs to understand the strategic environment to be addressed through different means and methods. It is obvious that there is a difference between the three strategic environments (conflict environment, peace environment, post- peace environment) in terms of inputs and strategies to deal with each one of them. There is an urgent need to understand each pattern separately, analyze its inputs, and identify the factors and variables that affect the continuity of this situation (conflict, peace, post-peace). It is not appropriate to identify treatment without diagnosis of the condition, so it is very important to understand the type of strategic environment to be dealt with it.
... Show More