The research aims:
1- To know the intemperance use of the internet by the University's students.
2- To know the differences with a statistical indication in the intemperance use of the internet after the gender's inconstant ( Males-females).
3- To know the differences with a statistical indication in the intemperance use of the internet after the Major's inconstant ( scientific- humanistic)
This current research restricts a sample of the university students for both sexes.
Theoretical frame:
The research viewed several theories that explains intemperance use of the internet & the results.
Research measures :
1- Research has been adapted the scale ( Internet use) which was prepared by the Moroccan researcher ( Muhammad Muhammad Almaghribi) that measures intemperance ( Internet use) through the total grade that the examined get , the scale was adapted according to the
Abstract:-
The approach maintenance and replacement one of techniques of operations research whom cares of the failure experienced by a lot of production lines which consist of a set of machines and equipment, which in turn exposed to the failure or work stoppages over the lifetime, which requires reducing the working time of these machines or equipment below what can or conuct maintenance process once in a while or a replacement for one part of the machine or replace one of the machines in production lines. In this research is the study of the failure s that occur in some parts of one of the machines for the General Company for Vege
... Show MoreBased on the assumption that the more teachers know about brain science, the better
prepared they will be to make instructional decisions.
Mind Mapping is a powerful tool for assisting any form of writing. Language is an
important device and a very beneficial means for human being to communicate with other
people .Writing is one of the language skills that will never be left in education.
The study aims at investigating the Impact of applying mind mapping technique as a prewriting
tool on Iraqi EFL college students in essay writing. To do so, 60 EFL college students
were divided randomly selected and divided into two groups experimental and control. Prior
to treatment, participants of the both groups were given a
This study examines patterns of exposure of Iraqi university students to selective daily Iraqi newspapers and the motives of this exposure, as well as its associated factors that affect the average exposure. It tries to answer several questions, including those related to the levels of exposure of Iraqi university students to daily Iraqi newspapers and classification of patterns of selective exposure to daily Iraqi newspapers and the most prominent Iraqi daily newspapers that are selectively exposed by Iraqi university students. It also examines the motives of this selective exposure and factors that increase the degree of exposure to the daily Iraqi newspapers, and the most prominent stages in which Iraqi university students find their
... Show MoreBACKGROUND: Chronic prostatitis/chronic pelvic pain syndrome (CP/CPPS) is common, yet no curative treatment identified. Cinnamon is a herbal substance, which has many applications in medicine. AIM: The aim of the study was to study the effect of cinnamon on patients with chronic pelvic pain syndrome. METHODS: Sixty patients with documented CP/CPPS randomized into two groups during 2018 and 2019 in Baghdad. The first group received 60 capsules each contained 1 g of cinnamon. The other group received 60 capsules each contained 1 g of sugar powder (placebo). All the patients instructed to take one capsule twice daily for 1 month. National Institutes of Health-Chronic Prostatitis Symptom Index (NIH-CPSI) was reported for bot
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
Abstract
The curriculum is amodern science which reflects the social philosophy and
what it needs . It searches for amothod that limits the knowledge that the
indiridual gets in the society and the sorts of the culture that suits the enrironment
in which they live. It also clears for them their history and their great in heritance.
It has a great in flunce in their mental growth ,and it teacher the students new
roles in the thin king ,and training then on what they have learned . According to
there points the problem concentrats on the mostimpotant difficulties which facer
thestudents in studing Arabic langnage text-books
In spite of the great care that the text taker but it is full of subjects and studies
w
This study aims to determine the extent to which Palestinian elites use digital diplomacy to confront the Israeli narrative by exploring the motives for usage, patterns, essential digital diplomatic tools, and achieved satisfactions. The study adopted a survey methodology and employed a questionnaire distributed to a sample of 110 Palestinian political and media elites.
The study arrived at several key findings, including: Palestinian elites allocate a substantial (%67) of their efforts towards employing digital diplomacy as a response to the Israeli narrative. The foremost platforms employed for this purpose are Facebook and Twitter. The primary motivation for utilizing these digital platforms is to present
The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
The research aims to identify the level of psychological burnout among the professors of Sana’a University in light of the armed conflicts in Yemen. The research sample consisted of (104) faculty members. A descriptive-analytical approach was adopted. The results of the research showed that university professors suffer from psychological burnout at a very high level in the overall score of the scale. There were no statistically significant differences in terms of gender, academic degree, teaching experience, marital status, number of family members, or salary. In light of the results, the researcher presented a number of relevant recommendations and suggestions.
This study was conducted to evaluate the hydrocarbon biodegradation abilities of Enterobacter cloacae, Staphylococcus aureus, Sphingomonas paucimobilis, and Pentoae species which were isolated from different diesel-contaminated soil samples. The isolates were identified by the Vitek 2 system. Fourier-transform spectroscopy (FT-IR) tested the potential of these isolates to biodegrade the diesel according to the peak areas, a significant decrease in the area of the peaks at 2856-2928 cm−1 corresponds to aliphatic hydrocarbons. The appearance of small peaks at 900-1032 cm−1 refers to substituted benzene derivative compounds. An appearance of some new peaks at 3010- 3030 cm−1 which indicate the presence of alcohol (-OH) and ketones (RC=O)
... Show More