The most important topic for psychologist generally is factor of education and it's active tools because learning needs active perception for stimulus that recived by the educator and give it avalue and meaning , Need for cognition is
very important in the various daily fields of life , especially in learning and teaching and the academy work , it help with shifting the learning level for people , and icreas the intense and challenge between them
The research endeavored to achieve the following aim :
1- Measuring the level of peripheral perception for the university student .
2- Measuring the level of need for cognition for the university student .
3- Measuring the level of peripheral perception for the university student according to gender .
4- Measuring the level of need for cognition for the university student according to gender .5- Finding the relationship between both variables (peripheral perception) and (need for cognition) for the university students .
The two scales are applied to sample consisted of (100) male and female students of the university student / al jadriya compound exclusively for reasons mentioned with in the current research , and for psychometric properties of the test of peripheral perception it has high validity and reliability and to extract the psychometric properties of the scales of need for cognition is applied to sample consisted of (200) male and female students of the university students , after applying both research tools to the sample and data analysis , the study has arrived at the following result .
The sample of the research males have (field of vision , power of focus , divided attention , reaction time to stimuli) more than the females , but there was no differences between males and females according to (emotional maturity) .
The sample of the research have higher need for cognition .
And there is appositive relationship between (field of vision and emotional maturity) and the variable of need for cognition and there is negative relationship between (power of focus , divided attention , reaction time to stimuli) and the variable of need for cognition .
A quantitative description of microstructure governs the characteristics of the material. Various heat and excellent treatments reveal micro-structures when the material is prepared. Depending on the microstructure, mechanical properties like hardness, ductility, strength, toughness, corrosion resistance, etc., also vary. Microstructures are characterized by morphological features like volume fraction of different phases, particle size, etc. Relative volume fractions of the phases must be known to correlate with the mechanical properties. In this work, using image processing techniques, an automated scheme was presented to calculate relative volume fractions of the phases, namely Ferrite, Martensite, and Bainite, present in the
... Show MoreThe science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show MoreAs cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreIn this study, we present different methods of estimating fuzzy reliability of a two-parameter Rayleigh distribution via the maximum likelihood estimator, median first-order statistics estimator, quartile estimator, L-moment estimator, and mixed Thompson-type estimator. The mean-square error MSE as a measurement for comparing the considered methods using simulation through different values for the parameters and unalike sample sizes is used. The results of simulation show that the fuzziness values are better than the real values for all sample sizes, as well as the fuzzy reliability at the estimation of the Maximum likelihood Method, and Mixed Thompson Method perform better than the other methods in the sense of MSE, so that
... Show MorePseudomonas aeruginosa is considered as a developing opportunistic nosocomial pathogen and is well-known for its multidrug resistance that can be efficiently treated by a combination of antibiotics andefflux pump inhibitors (EPI). Therefore, the purpose of this study was to investigate the effect of curcumin as an EPI for the enhancement of the effectiveness of antibiotics against multidrug resistant (MDR) isolates ofP. aeruginosa. Susceptibility patterns of suspected bacteria was determined using the disc diffusion method andresistant bacteria were identified using chromogenic agar and 16S rDNA. The effectsof curcuminon the enhancement of antibiotics’s activity was evaluated usingthe broth microd
... Show MoreThis paper introduces the Multistep Modified Reduced Differential Transform Method (MMRDTM). It is applied to approximate the solution for Nonlinear Schrodinger Equations (NLSEs) of power law nonlinearity. The proposed method has some advantages. An analytical approximation can be generated in a fast converging series by applying the proposed approach. On top of that, the number of computed terms is also significantly reduced. Compared to the RDTM, the nonlinear term in this method is replaced by related Adomian polynomials prior to the implementation of a multistep approach. As a consequence, only a smaller number of NLSE computed terms are required in the attained approximation. Moreover, the approximation also converges rapidly over a
... Show MoreThe tight gas is one of the main types of the unconventional gas. Typically the tight gas reservoirs consist of highly heterogeneous low permeability reservoir. The economic evaluation for the production from tight gas production is very challenging task because of prevailing uncertainties associated with key reservoir properties, such as porosity, permeability as well as drainage boundary. However one of the important parameters requiring in this economic evaluation is the equivalent drainage area of the well, which relates the actual volume of fluids (e.g gas) produced or withdrawn from the reservoir at a certain moment that changes with time. It is difficult to predict this equival
Fungi produce a series of toxic compounds on corn, especially Fumonisin B1 (FB1) toxin produced by Fusarium spp. and promoting cancer activity in humans and animals. This study aimed to the isolation and identification of fungi associated with local corn seeds and the detection for the presence of FB1 by using ELISA technique. Thirty samples of corn ears were collected from silos and markets in Baghdad city during the period from November 2018 to March 2019. The present study found that Fusarium was the dominant isolate among fungi in terms of the relative density 57.07%, followed by Aspergillus 31.17%, Rhizopus 3.36%, Alternaria 2.88%, Mucor 2.16%, Penicillium 1.92%, Trichothecium 0.96%, and Helminthosporium 0.48%. FB1 was detected in a
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More