The study aims to identify the impact of electronic games on increasing the dropout rate among students in the basic stage in Jordan from their teachers’ point of view. The study adopted a descriptive survey method. Its community consisted of all fe(male) teachers of the basic stage in public and private schools, (First Amman, Irbid, and special education in Zarqa and Amman). The electronic questionnaire was used as a tool for the study. The results have shown that the effect of electronic games on increasing the dropout rate among students in the basic stage in Jordan was high. Besides, there are statistically significant differences due to the gender variable for males. There are statistically significant differences due to the varia
... Show MoreFrom 211 urine samples, Gram negative bacteria were isolated from only 61 urine samples with isolation percentage 28.9%. Escherichia coli were isolated percentage 70.49% while Klebsiella pneumoniae and Psendomonas aeruginosa were 8.19% and 6.55%, respectively.Proteus spp. Were isolated from 9 (14.75%), P. mirablis and P. vulgaris were isolates percentage 11.47% and 3.27%, respectively. Uroepithelial Cell Adhesin (UCA) fimbriae expression by P.mirabilis isolates was detected by the high capacity to adhesion to human uroepithetial cells, the isolate p.mirabilis U7 was adhesion to human uroepithelial cells mean no.30.2 bacteria/cell when grown on luria broth at 37C for 24h, but then grown it’s on luria agar at 37C for 24h the adhesion
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreMost of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreThis paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.
In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreThe inhibitive action of Reactive Red (RR31) dye against corrosion of carbon steel in 1M acetic acid solution has been studied using gravimetric method at temperature ranged (288-318)K. The antibacterial activity for the different concentrations of RR31 dye against different bacterial species was studied. The experimental data indicates that this dye acts as a potential inhibitor for carbon-steel in acetic acid medium and the protection efficiency increase with increasing (RR31) dye. The adsorption of (RR31) dye on the carbon steel surface was found to follow Langmuir adsorption isotherm. Thermodynamic data for the adsorption process such as Gibbs free energy change ∆Gads, enthalpy change ∆Hads, and entropy change ∆Sads were estima
... Show More