The current search aims to identify First: To measure the level of authoritarian personality among the students of the sample as a whole. Second: Measurement of differences in the level of authoritarian personality among students in the middle school according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Third: the level of control site level among the students of the sample as a whole. Ra'aa: Measurement of differences in the level of the control site among junior students according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Fifth: Explain the relationship between the authoritarian personality and the locus of control among the students of the research sample. In order to achieve the objectives of the current research, the sample was randomized by the random method of 061 students from the middle school of the third directorate in accordance with the gender variables (male and female) and the academic and academic specialization (8105-8106) In order to measure the level of authoritarian personality in the students, the researcher built the measure of authoritarian personality, the number of paragraphs (51), after being presented to a committee of arbitrators and experts in this field, which is the apparent truth, extracted the strength of the standard of the scale paragraphs using the method of the two extremes and using the test of two independent samples, (1.15) except two paragraphs (2,82) were excluded from the scale because it is less than the level of significance required so that the number of paragraphs of the scale (42) (3) areas. After the calculation of the construction accuracy of the scale and the stability of the scale was calculated in the Vaccronbach method with a consistency coefficient (1.26). As for the measurement of the site of control, the researcher adopted the measure of sweetness 0121 (52), after it was modified. The necessary cytometric properties of the apparent honesty and the validity indicators of the structure of the two extremes were obtained and using Pearson correlation coefficient (2) were excluded because they were less than the required level of significance. If the scale became final (51), it was divided into (1) fields. The consistency of the scale was obtained by the Vaccronbach method with a consistency coefficient of 1.28. The researcher reached the following results: 0. The middle school students overcome them with a tolerant personality in their behavior. 8. There are no statistically significant differences in the authoritarian personality by gender. 3. There are no statistically significant differences for the authoritarian personality by variable (specialization). 4 - that the junior high school students in the direction of internal control and external in general. 5. There are statistically significant differences in the location of the locality according to the sex variable. The males tend to control their position internally. 6. There are no statistically significant differences in the location of the control by variable (specialization). 2. There is no statistically significant correlation between the authoritarian personality and the locus of control. In the light of the findings of the researcher, I made a number of conclusions, recommendations and suggestions mentioned in chapter .
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreDue to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi
... Show MoreLearn new methods of teaching mathematics contribute to raising the level of pupils to acquire mathematical concepts primary stage
Attempt advancement in the level of mathematics teaching for the better through the use of modern teaching strategies. The research aims at the progress in the acquisition of mathematical concepts schoolgirls after subjecting the fourth grade to teach in active learning strategies, the number of research sample (60) schoolgirl, by (30) schoolgirl experimental group and 30 pupils of the control group. Clear from the results shown the presence of a statistically significant difference between the acquisition of concepts of schoolgirls two groups (experimental and control) for the benefit of pupils of the exp
Artificial lift techniques are a highly effective solution to aid the deterioration of the production especially for mature oil fields, gas lift is one of the oldest and most applied artificial lift methods especially for large oil fields, the gas that is required for injection is quite scarce and expensive resource, optimally allocating the injection rate in each well is a high importance task and not easily applicable. Conventional methods faced some major problems in solving this problem in a network with large number of wells, multi-constrains, multi-objectives, and limited amount of gas. This paper focuses on utilizing the Genetic Algorithm (GA) as a gas lift optimization algorit
This research has come out with that strategies made by Porter as generally strategies applicable to any size and type of economic units cannot be applied to many of the economic units in the world in generally and in Iraq especially not a lot of economic units have the resources and competencies that enable them to provide a unique product of its kind in the minds of customers and then adopt a differentiation strategy and not a lot of economic units have the resources and competencies that make them the cost leader. Differentiators and cost leaders are minority in the world while not differentiators and not cost leaders are majority in the world.
The economic units are not differentiators and not c
... Show MoreAccurate prediction of river water quality parameters is essential for environmental protection and sustainable agricultural resource management. This study presents a novel framework for estimating potential salinity in river water in arid and semi‐arid regions by integrating a kernel extreme learning machine (KELM) with a boosted salp swarm algorithm based on differential evolution (KELM‐BSSADE). A dataset of 336 samples, including bicarbonate, calcium, pH, total dissolved solids and sodium adsorption ratio, was collected from the Idenak station in Iran and was used for the modelling. Results demonstrated that KELM‐BSSADE outperformed models such as deep random vector funct
The internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat
... Show MoreIn this work, an explicit formula for a class of Bi-Bazilevic univalent functions involving differential operator is given, as well as the determination of upper bounds for the general Taylor-Maclaurin coefficient of a functions belong to this class, are established Faber polynomials are used as a coordinated system to study the geometry of the manifold of coefficients for these functions. Also determining bounds for the first two coefficients of such functions.
In certain cases, our initial estimates improve some of the coefficient bounds and link them to earlier thoughtful results that are published earlier.