The research aims to identify the effect of the training program that is based on integrating futuristic thinking skills with classroom interaction patterns on mathematics teachers in order to provide their students with creative solution skills. The research sample consisted of 31teachers (15 teachers for the experimental group and 16 for the control groups). The researcher developed a measure for the academic self-efficacy consisting of (39) items. Its validity, reliability, coefficient of difficulty and discriminatory power were estimated. To analyze the findings, the researcher adopted the Mann-Whitney (U) test and the effect size, and the findings were as follows: There is a statistically significant difference at the significance leve
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreObjective: The present study aimed to shed light on the role of narghileh and cigarette smoking on immunity status of oral cavity by assess (C3 complement component, Immunoglobulin A, Total protein, α-Amylase and EBV IgG antibody). Method: Saliva levels in two smokers groups the first include 28 narghileh smokers and the second include 32 narghileh and cigarette smokers as well as 30 non-smokers consider as control. Results: As compared control, the levels of C3, IgA and total protein were significantly decreased, and the highest decreased was observed in saliva of narghileh and cigarette smokers, the result was (C3= 0.400±0.194 µg vs. 9.728±3.561 µg; IgA= 2.460±0.492 mg/dl vs. 5.048±0.937 mg/dl; Total protein= 170.20±45.93 mg% vs.
... Show MoreGas-lift technique plays an important role in sustaining oil production, especially from a mature field when the reservoirs’ natural energy becomes insufficient. However, optimally allocation of the gas injection rate in a large field through its gas-lift network system towards maximization of oil production rate is a challenging task. The conventional gas-lift optimization problems may become inefficient and incapable of modelling the gas-lift optimization in a large network system with problems associated with multi-objective, multi-constrained, and limited gas injection rate. The key objective of this study is to assess the feasibility of utilizing the Genetic Algorithm (GA) technique to optimize t
Chitinase-3-like 1 protein (YKL-40) is a glycoprotein primarily produced in the arthritic joint and plays a crucial role in inflammatory processes. The aim of the study is to establish the role of YKL-40 as a biomarker for rheumatoid arthritis (RA) compared to proinflammatory biomarkers and disease activity. The study included 58 patients and 18 control. Diseases activity score (DAS-28) and clinical disease activity index (CDAI) were measured. Serum level of YKL-40, tumor necrosis factor-α (TNF-α), interleukin-1B (IL-1β), erythrocyte sedimentation (ESR), rheumatoid factor (RF), C-reactive protein (CRP), and anti-citrullinated protein antibody (ACPA) were assessed. The results showed that the median serum YKL-40 level which was 5.42
... Show MoreMicroencapsulated of paraffin wax which acts as core material of phase change
material covered by polymer was prepared by using rabid (physical-chemical) with lower
energy (green) method. Prepolymer of condensed Melamine-Formaldehyde resin, was
solidified by heat effect gradually and surrounds the Paraffin wax as microcapsules. The
diameter of the prepared capsules was about (170-220) micron which has a proportion with
the prepolymer temperature, otherwise the thermal analysis appears as a best value of
enthalpy (ΔH) which was (12 J/gm) when the prepolymer temperature was (60˚C)
Abstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show More