The effects of Internet use on university’s students:The effects of Internet use on university’s students:“A Study on a Sample of Jordanian University’s students "This survey aims to identify the most important effects of Internet use on Jordanian public and private universities’ students by monitoring and analyzing a set of indicators that show the quality of the effects on specific fields such as cultural, social, psychological, moral and political effects .To achieve these goals, the study attempts to answer the following questions:1. What are the effects of Internet’s use on students?2. What is the relationship between the effects and demographic variables such as gender, age, family size and academic level and specialization. The population of our study is four public and private Jordanian universities. The questionnaire was distributed to study population in various specialties in all colleges of the universities by using available sample . The sample of the study was 891students . The males sample was( 55.22%) while the females sample was (44.78%( The data were analyzed by using descriptive statistical and analytical statistical measures by using the Statistical Package for Social Sciences (SPSS). The study has discussed the types of the effects of the internet on our samples in the following fields: cognitive and scientific influences, social and recreational influences, psychological effects, value effects, political influences, negative effects.It is clear that the "effect fields" of the Internet use on university’s students have high internal consistency values.In the field of "negative effects" the stability values ranged between (0.782) and (0.883) , And for the field of "value effects" indicate appropriate stability values.The results showed that the mean field of the "effects of Internet use" for university’s students was achieved to a medium extent. The mean of this field (2.01) was of relative importance (67.0). The level of all fields as a whole was average. The mathematical mean ranged from 1.90 to 2.23. In the first place was the "cognitive and scientific influences" with a mean of (2.23) and a relative importance (74.33). The social and recreational influences ranked second with a mean of 2.06 and a relative importance of 68.67. Internet use is observed to be medium, with average (1.94) relative importance (64.67), Finally, the "value effects" came with a mean (1.90) with relative importance (63.33).The results also indicate that "global electronic sites " are in the first rank electronic sites to be visited by the students , followed by "Arab sites" while "local sites" came in last rank. It indicates that the majority of students have a particular site they visit frequently.
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
A Multiple System Biometric System Based on ECG Data
The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Healthcare professionals routinely use audio signals, generated by the human body, to help diagnose disease or assess its progression. With new technologies, it is now possible to collect human-generated sounds, such as coughing. Audio-based machine learning technologies can be adopted for automatic analysis of collected data. Valuable and rich information can be obtained from the cough signal and extracting effective characteristics from a finite duration time interval that changes as a function of time. This article presents a proposed approach to the detection and diagnosis of COVID-19 through the processing of cough collected from patients suffering from the most common symptoms of this pandemic. The proposed method is based on adopt
... Show More