The effects of Internet use on university’s students:The effects of Internet use on university’s students:“A Study on a Sample of Jordanian University’s students "This survey aims to identify the most important effects of Internet use on Jordanian public and private universities’ students by monitoring and analyzing a set of indicators that show the quality of the effects on specific fields such as cultural, social, psychological, moral and political effects .To achieve these goals, the study attempts to answer the following questions:1. What are the effects of Internet’s use on students?2. What is the relationship between the effects and demographic variables such as gender, age, family size and academic level and specialization. The population of our study is four public and private Jordanian universities. The questionnaire was distributed to study population in various specialties in all colleges of the universities by using available sample . The sample of the study was 891students . The males sample was( 55.22%) while the females sample was (44.78%( The data were analyzed by using descriptive statistical and analytical statistical measures by using the Statistical Package for Social Sciences (SPSS). The study has discussed the types of the effects of the internet on our samples in the following fields: cognitive and scientific influences, social and recreational influences, psychological effects, value effects, political influences, negative effects.It is clear that the "effect fields" of the Internet use on university’s students have high internal consistency values.In the field of "negative effects" the stability values ranged between (0.782) and (0.883) , And for the field of "value effects" indicate appropriate stability values.The results showed that the mean field of the "effects of Internet use" for university’s students was achieved to a medium extent. The mean of this field (2.01) was of relative importance (67.0). The level of all fields as a whole was average. The mathematical mean ranged from 1.90 to 2.23. In the first place was the "cognitive and scientific influences" with a mean of (2.23) and a relative importance (74.33). The social and recreational influences ranked second with a mean of 2.06 and a relative importance of 68.67. Internet use is observed to be medium, with average (1.94) relative importance (64.67), Finally, the "value effects" came with a mean (1.90) with relative importance (63.33).The results also indicate that "global electronic sites " are in the first rank electronic sites to be visited by the students , followed by "Arab sites" while "local sites" came in last rank. It indicates that the majority of students have a particular site they visit frequently.
The spectral response of the Si solar cell does not coincidence with the sun irradiance spectrum, so the efficiency of the Si solar cell is not high. To improve the Si solar cell one try to make use of most region of the sun spectrum by using dyes which absorb un useful wavelengths and radiate at useful region of spectrum (by stock shift). Fluorescence's dye is used as luminescent concentrator to increase the efficiency of the solar cell. The results show that the performance efficiency and out power for crystalline silicon solar cells are improved.
Shooting skill in basketball is one of the most important offensive skills and the final stage of the team's attack and the culmination of all skills in which points are scored, including the skill of peaceful shooting. The research aims to prepare competitive exercises and understand the impact of competitive exercises on developing coordination and balance for basketball players under 18 years old. The researcher used the experimental method with the single experimental group approach, including the research community of female athletes in the public directorates of education in Baghdad, totaling (6) directorates and (72) players. The research sample was selected intentionally, consisting of female athletes in the sports activity of the D
... Show MoreBecloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay
... Show MoreArabic calligraphy is one of the ancient arts rooted in history, And that he grew up conflicting views and writings addressed as a, communication tool for the linguistic The teaching calligraphy note an art and science because it depends on the fixed assets and precise rules in his art because centered Beauty It targets teach Arabic calligraphy speed as the education and recitation helps to write fast Which have great interest in the field of education and in life both Also accompanied Arabic calligraphy and scientific renaissance significant knowledge in the Ara
... Show MoreUncompressed form of the digital images are needed a very large storage capacity amount, as a consequence requires large communication bandwidth for data transmission over the network. Image compression techniques not only minimize the image storage space but also preserve the quality of image. This paper reveal image compression technique which uses distinct image coding scheme based on wavelet transform that combined effective types of compression algorithms for further compression. EZW and SPIHT algorithms are types of significant compression techniques that obtainable for lossy image compression algorithms. The EZW coding is a worthwhile and simple efficient algorithm. SPIHT is an most powerful technique that utilize for image
... Show More
ملخص البحث:
ان الله تعالى هو الذي خلق جميع المخلوقات ، والذي بيده الموت والحياة وان كل هذه المخلوقات تحتاج الى اوامر ، وهذه الاوامر الالهية وجهها الله لعبادة بوساطة انبياءه ( عليهم السلام) فكانوا هم اول المستسلمين والمنقادين لأوامره ، فجاءت الآيات الكريمة مخاطبة للأنبياء واقوامهم بشكل عام ولنبينا محمد (r) بشكل خاص.
اما عن المضمون البحثي فقد جاءت مادته مقسمة الى ثل
... Show MoreIn this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water
... Show MoreGas Lasers are important tools that are used in variety purposes, for their low and (cw) output power. The aim of this study was to prepare a way to calculate an optimum stimulated emission cross-section in a gas laser containing a mixture of Xenon and Neon by (30%-70%). The process was a theoretical study of each gas in separate in terms of their physical properties as an active medium. The results of these calculations are logic and more convenient than other mixtures used before
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show More