Preferred Language
Articles
/
jperc-1060
Goal Conflict among Twelfth-Grade Students based on Gender and Major
...Show More Authors

The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of power and incompatible strategies) showed lower conflict. The ANOVA analysis showed no differences according to specialization, and interaction between gender and specialization. However, the differences were observed according to gender in “limit of budget” and “unclear task”. Recommendations are discussed.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 12 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of chemotherapy on oral health status and salivary alkaline phosphatase among leukemic patients
...Show More Authors

Background: Leukemia is a broad term given to a group of malignant diseases characterized by diffuse replacement of bone marrow with proliferating leukocyte precursors. Chemotherapy has been increasingly used to treat malignant conditions. The systemic sequelae as a result of these immunosuppressive techniques induce many oral and dental complications. This study was conducted to evaluate the effect of chemotherapy on oral health status and activity of salivary alkaline phosphates enzyme in patients with acute lymphocytic leukemia. Materials and methods: The study groups included 28 patients with acute lymphocytic leukemia; they were under chemotherapy, aged 20-25 year old. The control group includes healthy subjects matching with study

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 04 2017
Journal Name
Journal Of The College Of Education For Women
Adolf Hitler, existence and his political victim until junuary, 1933 Dr.Suaad Rood Sheer Mohammed (PhD) Dr. Qassim Abdul Amir Waseem
...Show More Authors

This study aims to track and analysis Hitler's personality by explaining the impact of the social environment in shaping his behavior and addressing the defeat of Germany in the World War 1 and its impact on building his political personality and included his political activism and his policy to get rid of the terms of the Versailles Military Treaty in the light of his plans in his book ( Kifahi) The nature of the study had to be divided into an introduction and two topics followed by the conclusion of the most important results, in addition to a list of references and a summary in English and from God the Good luck.

View Publication Preview PDF
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Psychological Flow and its Association with Psychological Well-Being and Self –Management among a Sample of Fine Artists in Makkah Region Haneen Hussain Daggas
...Show More Authors

Abstract

The research aims to examine the relationship between psychological flow, psychological well-being, and self-management among a sample of fine artists in the Makkah region and its governorates. The research also aims to examine the mean group differences in psychological flow, psychological well-being, and self-management due to demographic variables (sex and years of practicing arts). The sample consists of (110) male and female fine artists. The descriptive correlational approach was performed to collect the data by using the psychological flow scale developed by Payne et al (2011), which was translated by the researcher, the Oxford happiness questionnaire developed by Hills and Argyle (2002), it has t

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (19)
Crossref (17)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Classification of fetal abnormalities based on CTG signal
...Show More Authors

The fetal heart rate (FHR) signal processing based on Artificial Neural Networks (ANN),Fuzzy Logic (FL) and frequency domain Discrete Wavelet Transform(DWT) were analysis in order to perform automatic analysis using personal computers. Cardiotocography (CTG) is a primary biophysical method of fetal monitoring. The assessment of the printed CTG traces was based on the visual analysis of patterns that describing the variability of fetal heart rate signal. Fetal heart rate data of pregnant women with pregnancy between 38 and 40 weeks of gestation were studied. The first stage in the system was to convert the cardiotocograghy (CTG) tracing in to digital series so that the system can be analyzed ,while the second stage ,the FHR time series was t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
GNSS Baseline Configuration Based on First Order Design
...Show More Authors

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic

... Show More
View Publication