The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of power and incompatible strategies) showed lower conflict. The ANOVA analysis showed no differences according to specialization, and interaction between gender and specialization. However, the differences were observed according to gender in “limit of budget” and “unclear task”. Recommendations are discussed.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show Moreأولاً: مشكلة البحث:
على الرغم من أن كل شخص هو كائن متفرد بحد ذاته ، إلا أن هناك تشابهات مشتركة بين كثير من الناس ، وتشكل هذه التشابهات أنماطآ شخصية يهدف علم النفس إلى دراستها وفهمها.
وقد حاول علماء النفس والمنظرون في مجال الشخصية بناء أنظمة نظرية لتغطية التباين الواسع بين الأفراد في السلوك ضمن المواقف المختلفة. وهدفت جهودهم إلى فهم الدافعية البشرية ، والسلوك عن طريق عملية النمو
... Show Moreاستهدف البحث الحالي تعرف أنماط الشخصية الإنيكرام السائدة ضمن مركز الغريزة لدى طلبة قسم التربية الخاصة، وكذلك تعرف أنماط الشخصية الإنيكرام السائدة ضمن مركز الغريزة لدى طلبة قسم التربية الخاصة وفقاً لمتغير النوع (ذكور، إناث)، ولتحقيق هذه الأهداف تم اعتماد الصورة المختصرة لمقياس أنماط الشخصية الإنيكرام المُعد من قبل (ريسو-هيودسن، 1995)، ترجمة (الياسري، 2004)، (تقنين: السلطاني، 2007)، وقد تم التحقق من الخصائص السيكومت
... Show More