Preferred Language
Articles
/
jcoeduw-65
The Authoritarian Character and Its Relation to Setting Location For High School Students
...Show More Authors

The current search aims to identify First: To measure the level of authoritarian personality among the students of the sample as a whole. Second: Measurement of differences in the level of authoritarian personality among students in the middle school according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Third: the level of control site level among the students of the sample as a whole. Ra'aa: Measurement of differences in the level of the control site among junior students according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Fifth: Explain the relationship between the authoritarian personality and the locus of control among the students of the research sample. In order to achieve the objectives of the current research, the sample was randomized by the random method of 061 students from the middle school of the third directorate in accordance with the gender variables (male and female) and the academic and academic specialization (8105-8106) In order to measure the level of authoritarian personality in the students, the researcher built the measure of authoritarian personality, the number of paragraphs (51), after being presented to a committee of arbitrators and experts in this field, which is the apparent truth, extracted the strength of the standard of the scale paragraphs using the method of the two extremes and using the test of two independent samples, (1.15) except two paragraphs (2,82) were excluded from the scale because it is less than the level of significance required so that the number of paragraphs of the scale (42) (3) areas. After the calculation of the construction accuracy of the scale and the stability of the scale was calculated in the Vaccronbach method with a consistency coefficient (1.26). As for the measurement of the site of control, the researcher adopted the measure of sweetness 0121 (52), after it was modified. The necessary cytometric properties of the apparent honesty and the validity indicators of the structure of the two extremes were obtained and using Pearson correlation coefficient (2) were excluded because they were less than the required level of significance. If the scale became final (51), it was divided into (1) fields. The consistency of the scale was obtained by the Vaccronbach method with a consistency coefficient of 1.28. The researcher reached the following results: 0. The middle school students overcome them with a tolerant personality in their behavior. 8. There are no statistically significant differences in the authoritarian personality by gender. 3. There are no statistically significant differences for the authoritarian personality by variable (specialization). 4 - that the junior high school students in the direction of internal control and external in general. 5. There are statistically significant differences in the location of the locality according to the sex variable. The males tend to control their position internally. 6. There are no statistically significant differences in the location of the control by variable (specialization). 2. There is no statistically significant correlation between the authoritarian personality and the locus of control. In the light of the findings of the researcher, I made a number of conclusions, recommendations and suggestions mentioned in chapter .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Production of Zinc oxide for medical application from Zinc scraps
...Show More Authors

In this work ,medical zinc oxide was produced from zinc scraps instead of traditional method which used for medical applications such as skin diseases, Iraq is importing around 50 ton/year for samarra plant the producted powder has apartical size less than 5 micron and the purity was more than 99.98%,also apilot plant of yield capacitiy 15 kg/8hours wsa designed and manufactured .

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 04 2021
Journal Name
(al-qadisiyah-journal Of Pure Science(qjps
Reliable Iterative Method for solving Volterra - Fredholm Integro Differential Equations
...Show More Authors

The aim of this paper is to propose a reliable iterative method for resolving many types of Volterra - Fredholm Integro - Differential Equations of the second kind with initial conditions. The series solutions of the problems under consideration are obtained by means of the iterative method. Four various problems are resolved with high accuracy to make evident the enforcement of the iterative method on such type of integro differential equations. Results were compared with the exact solution which exhibits that this technique was compatible with the right solutions, simple, effective and easy for solving such problems. To evaluate the results in an iterative process the MATLAB is used as a math program for the calculations.

View Publication
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Neuro-Self Tuning Adaptive Controller for Non-Linear Dynamical Systems
...Show More Authors

In this paper, a self-tuning adaptive neural controller strategy for unknown nonlinear system is presented. The system considered is described by an unknown NARMA-L2 model and a feedforward neural network is used to learn the model with two stages. The first stage is learned off-line with two configuration serial-parallel model & parallel model to ensure that model output is equal to actual output of the system & to find the jacobain of the system. Which appears to be of critical importance parameter as it is used for the feedback controller and the second stage is learned on-line to modify the weights of the model in order to control the variable parameters that will occur to the system. A back propagation neural network is appl

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
User (K-Means) for clustering in Data Mining with application
...Show More Authors

 

 

  The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.

      And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
Robust Adaptive Sliding Mode Controller for a Nonholonomic Mobile Platform
...Show More Authors

In this paper, a robust adaptive sliding mode controller is designed for a mobile platform trajectory tracking.  The mobile platform is an example of a nonholonomic mechanical system. The presence of holonomic constraints reduces the number of degree of freedom that represents the system model, while the nonholonomic constraints reduce the differentiable degree of freedom. The mathematical model was derived here for the mobile platform, considering the existence of one holonomic and two nonholonomic constraints imposed on system dynamics. The partial feedback linearization method was used to get the input-output relation, where the output is the error functions between the position of a certain point on the platform

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Optimized Kalman filters for sensorless vector control induction motor drives
...Show More Authors

<span lang="EN-US">This paper presents the comparison between optimized unscented Kalman filter (UKF) and optimized extended Kalman filter (EKF) for sensorless direct field orientation control induction motor (DFOCIM) drive. The high performance of UKF and EKF depends on the accurate selection of state and noise covariance matrices. For this goal, multi objective function genetic algorithm is used to find the optimal values of state and noise covariance matrices. The main objectives of genetic algorithm to be minimized are the mean square errors (MSE) between actual and estimation of speed, current, and flux. Simulation results show the optimal state and noise covariance matrices can improve the estimation of speed, current, t

... Show More
Crossref (5)
Crossref
Publication Date
Sun Mar 01 2026
Journal Name
International Journal Of Engineering &amp; Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Engineering
Robustness Assessment of Regional GNSS Geodetic Networks for Precise Applications
...Show More Authors

Over the past few decades, the surveying fieldworks were usually carried out based on classical positioning methods for establishing horizontal and vertical geodetic networks. However, these conventional positioning techniques have many drawbacks such as time-consuming, too costly, and require massive effort. Thus, the Global Navigation Satellite System (GNSS) has been invented to fulfill the quickness, increase the accuracy, and overcome all the difficulties inherent in almost every surveying fieldwork. This research assesses the accuracy of local geodetic networks using different Global Navigation Satellite System (GNSS) techniques, such as Static, Precise Point Positioning, Post Processing Kinematic, Session method, a

... Show More
View Publication Preview PDF