Preferred Language
Articles
/
jperc-1060
Goal Conflict among Twelfth-Grade Students based on Gender and Major
...Show More Authors

The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of power and incompatible strategies) showed lower conflict. The ANOVA analysis showed no differences according to specialization, and interaction between gender and specialization. However, the differences were observed according to gender in “limit of budget” and “unclear task”. Recommendations are discussed.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Performance evaluation of heterogeneous network based on RED and WRED
...Show More Authors

Scopus (3)
Scopus
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2008
Journal Name
Journal Of Educational And Psychological Researches
بناء مقياس لآنماط الشخصية على وفق نظريةالانيكرام لدى طلبة الجامعة
...Show More Authors

أولاً: مشكلة البحث:

على الرغم من أن كل شخص هو كائن متفرد بحد ذاته ، إلا أن هناك تشابهات مشتركة بين كثير من الناس ، وتشكل هذه التشابهات أنماطآ شخصية يهدف علم النفس إلى دراستها وفهمها.

وقد حاول علماء النفس والمنظرون في مجال الشخصية بناء أنظمة نظرية لتغطية التباين الواسع بين الأفراد في السلوك ضمن المواقف المختلفة. وهدفت جهودهم إلى فهم الدافعية البشرية ، والسلوك عن طريق عملية النمو

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Route Educationl & Social Science Journal
الشخصية المبدعة وعلاقتها بالهناء النفسي لدى طلبة كلية التربية الاساسية
...Show More Authors

Publication Date
Sat Mar 26 2022
Journal Name
مجلة نسق
أنماط الشخصية الإنيكرام (مركز الغريزة) لدى طلبة قسم التربية الخاصة
...Show More Authors

استهدف البحث الحالي تعرف أنماط الشخصية الإنيكرام السائدة ضمن مركز الغريزة لدى طلبة قسم التربية الخاصة، وكذلك تعرف أنماط الشخصية الإنيكرام السائدة ضمن مركز الغريزة لدى طلبة قسم التربية الخاصة وفقاً لمتغير النوع (ذكور، إناث)، ولتحقيق هذه الأهداف تم اعتماد الصورة المختصرة لمقياس أنماط الشخصية الإنيكرام المُعد من قبل (ريسو-هيودسن، 1995)، ترجمة (الياسري، 2004)، (تقنين: السلطاني، 2007)، وقد تم التحقق من الخصائص السيكومت

... Show More
Preview PDF
Publication Date
Wed Mar 30 2011
Journal Name
التربية نبض حي وفعل إنساني متجدد / المؤتمرالعلمي الثالث عشركلية التربية الأساسية / الجامعة المستنصرية
قلق الرياضيات لدى طلبة مرحلة التعليم الأساسي وعلاقته ببعض المتغيرات
...Show More Authors