The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of power and incompatible strategies) showed lower conflict. The ANOVA analysis showed no differences according to specialization, and interaction between gender and specialization. However, the differences were observed according to gender in “limit of budget” and “unclear task”. Recommendations are discussed.
Abstract
Objective(s): To evaluate high school male students' knowledge about substance use, to determine the effectiveness of the education program on high school mal students' knowledge about substance use.
Methodology: A quasi-experimental (pre-posttest) design was carried out to determine the effectiveness of an educational program on knowledge of high school students about substance use in AL-Kut city. The study was started from 20th h September 2022 to 24th November 2022. The sample was non-probability (purposive sample) sample of (60) student were selected according to the study that are working in Al Kut Education Directo
... Show MoreThe rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E
... Show MoreThis study aims to identify the effects of globalized media on the creed deviation of young adults in the light of the challenges of globalization in all its forms. It aims to identify globalization’s most important means; media, while clarifying its concept and its most important types and tools and employing all media means for learning and proper education. The latters are safeguarded from the influences and effects of globalization, developing the spirit of coexistence and peaceful dialogue with others and clarifying the effect of creed deviation on weakening the Muslim community. The importance of the topic lie in how to address and maintain the ideological values and morals of our youth, make them aware of the challenges/da
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreAfter the Napoleonic Code of 1804 came without any legal rules specific to the duration of the contract, and was content to refer to it in scattered legal texts, Legislative Decree No. 2016-131 came to establish a comprehensive legal system for the duration of the contract, starting from the period of its formation, through the period of its implementation, and ending with its continuation after the expiration of its term, in the third section of the fourth chapter related to the effects of the contract (Articles 1210 - 1215), relying on judicial precedents on the one hand - which are many, as will be shown through the research pages - and contractual practices on the other hand. Perhaps the main motive that prompted the French legislator t
... Show MoreParkinson’s disease (PD) consider as a progressive ageing neurodegenerative disease, Parkinson’s consider as a heterogenous disease, with mainly initiate through correlation between genetic and epigenetic by inducing of different factors on some related genes, these factors like (environmental, toxicants, nutrition, heavy metals, pesticides, some drugs) and also(trauma on head ,strokes) in addition to unknown reasons which cause an idiopathic PD .Current study aims to focusing on specific related PD gene called SNCA by single nucleotides polymorphism (rs2619363) as a risk factor for PD initiation disease in PD patients in addition to study the effect of polymorphisms on random Iraqi patients with different gastrointestinal
... Show MoreMost recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or
... Show MoreIn recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.