This investigation was conducted to recognize the structure for (RHETI version 2.5 1999) by using exploratory and confirmatory factor analysis. Sample of (620) student of Al-Mustansrya University were administered the (RHETI).
The data of their responses was analyzed by using (PAF) and oblique rotating .
The findings explored (9) factors as one factor for each type and (184) items were loaded by the factors: (60) item for feeling center, (61) items for instinctive center and (63) items for thinking center.
Results of confirmatory factorial analysis supported a model designed by the researcher depended upon a theoretical views of Riso and Hudson
... Show More
Regression testing is a crucial phase in the software development lifecycle that makes sure that new changes/updates in the software system don’t introduce defects or don’t affect adversely the existing functionalities. However, as the software systems grow in complexity, the number of test cases in regression suite can become large which results into more testing time and resource consumption. In addition, the presence of redundant and faulty test cases may affect the efficiency of the regression testing process. Therefore, this paper presents a new Hybrid Framework to Exclude Similar & Faulty Test Cases in Regression Testing (ETCPM) that utilizes automated code analysis techniques and historical test execution data to
... Show MoreThe present study aims to test a range of hypotheses about the effectiveness of each of the theory of transactional leadership, and the theory of transformational leadership in the Egyptian environment, and to identify any of them are better able to predict the effectiveness of leadership. And after the effect will be to identify the quality of the relationship between the leader and the subordinate in leadership , and what is the role of transformational leadership dimensions influencing the effectiveness of leadership. The field study was conducted on a sample of companies' public and private sector and the government in Egypt. The results of the study resulted in experimental that transacti
... Show MoreTable tennis is considered one of the fast base sports that the player needs to have the speed of performance and awareness, especially in straight forward and back strikes, which is an important offensive skills, and the player success depends on his perception speed to the point of the fall of the ball in the arena of his competitor. But there is no way to measure cognitive processing speed. Therefore, the researchers sought to design a test that measures this ability to ensure its scientific evaluation, and then establish standard scores for this test for the players of the specialized school of table tennis, to help evaluate them objectively and move away from subjective estimates when evaluating and developing measuring instruments in
... Show MoreEvaluation of Dot. ELISA test for Diagnosis Visceral Leishmaniasis in Infected Children
This study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduce
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThis paper deals with the thirteenth order differential equations linear and nonlinear in boundary value problems by using the Modified Adomian Decomposition Method (MADM), the analytical results of the equations have been obtained in terms of convergent series with easily computable components. Two numerical examples results show that this method is a promising and powerful tool for solving this problems.
The research aims to verify the Role of Internal Auditing in Assessing the Risks of Strategic Operations (Acquisition) and then reflect on management decisions. Since all corporations wish to expand, growth and domination of the market may expose them to multiple risks that lead to failure. The research assumes two main hypotheses. First, there is no role for internal audit in evaluating the strategic operations (acquisition). Second, there is no relationship between internal auditing in assessing the risks of strategic operations (Acquisition) and management decisions. The data was collected by using a questionnaire distributed to a group of private bank employees. The statistical analysis regarding research rejected the two hyp
... Show MoreThis paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p
... Show More