The present study aimed to identify the availability of the National Council of Teachers of Mathematics (NCTM) standards in the content of mathematics textbooks at the basic education stage in the Sultanate of Oman. The study used the descriptive-analytical approach, adopting the method of content analysis through using a content analysis tool that included (43) indicators distributed on the four NCTM standards related to the field of geometry, after verifying their validity and reliability. The study population consisted of mathematics textbooks (first and second semesters) for ninth-grade students in the Sultanate of Oman in the academic year 2018/2019, while the sample consisted of Geometry units in the content of those books, which are (5) units in the two semesters. The researchers used specific and accurate procedures during the analysis process, by relying on the topic as a unit of analysis, the paragraph as a unit for recording, the criteria and indicators as categories for analysis, and then calculating the frequencies and percentages of the number of times the indicators were included in the content of those books. The findings of the study revealed that the percentage of including NCTM standards and indicators in the content of the mathematics books for the ninth grade in the Sultanate of Oman was weak with regard to some indicators and very weak and non-existent with respect to most indicators. Therefore, the study recommended the need to develop the mathematics curriculum in the Sultanate of Oman, especially textbooks, taking into account international standards in mathematics education, as well as the philosophy and aspirations of Omani society.
Surface electromyography (sEMG) and accelerometer (Acc) signals play crucial roles in controlling prosthetic and upper limb orthotic devices, as well as in assessing electrical muscle activity for various biomedical engineering and rehabilitation applications. In this study, an advanced discrimination system is proposed for the identification of seven distinct shoulder girdle motions, aimed at improving prosthesis control. Feature extraction from Time-Dependent Power Spectrum Descriptors (TDPSD) is employed to enhance motion recognition. Subsequently, the Spectral Regression (SR) method is utilized to reduce the dimensionality of the extracted features. A comparative analysis is conducted between the Linear Discriminant Analysis (LDA) class
... Show MoreThis work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.
... Show MoreAnalysis of Covariance consider to be quite important procedure to reduce the effect of some independents factors before going through the experiment.
By this procedure we can compare variances causes from the difference between treatments and error term variance of they are equals or less than consider to be not significant, otherwise if is significant.
We carry on with this comparison until we find the greatest covser for the significant variance flam the treatments.
There are methods can be used like least significant difference method, Duncan method and Turkeys' w-procedure and Student Newman.
Key Word: Analysis of variatio
... Show MoreThe intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..
In this research LSB technique has been used
... Show Moreالخلاصة
يتضمن البحث تعيين عنصر الزئبق السام بتراكيزنزرة عالية الدقة (نانوغرام) باستخدام منظومة يخار الزئبق البارد لنماذج غذائية (لحوم حمراء ، لحوم بيضاء ) مختلفة ونماذج مائية (ماء النهر، مياه صناعية ، ماء الشرب) وربط المنظومة بتقنية الامتصاص الذري اللهبي.
ان عنصر الزئبق من اشد العناصر سمية وان التراكيز المسموح بها عالميا لايتعدى جزء واحد
A prominent figure such as Yahya bin Khaldoun and a scholar of the moroccan countries in the medieval era, and had a special place in the history of the country and the state of Bani Zayan, and the positions he occupied in it and left his scientific, literary and historical traces, leaving him an imprint in the course of history and its events, and in this study
I dealt with the research: his personal life : his name and lineage, then his upbringing and his family.
The aim of the study is to know this character in the details of his personal and scientific life, according to the historical descriptive research method, including description and presentation of events, and linking them in a
... Show MoreThe research considers The Analysis Dimensions of The organizational citizen ship Behavior for a sample of the Faculty of the university of Baghdad through the five Dimensions of citizenship ((Altruism– couscientiosness– sportsmanship courtesy– civic virtue))
The sample contains (120) professor from four colleges of the Baghdad university.
The most Important conelusion is the rise of citizenship behavior level for the Iraqi professor through his generaliaed compliance for most dimensions of the citizenship behavior the most important recommanelations presenteel in research is the encouragement and development for this behavior because of its oby viosis impact on the p
... Show MoreThe extraction, study, and accurate interpretation of the morphology database of a basin are the basic blocks for building a valid geomorphological understanding of this basin. In this work, a new approach is presented which is to use three different GIS based methods to extract databases with specific geographical information and then use the concept of information intersection to make a realistic geomorphological perspective for the study area.
In the first method, data integration of remote sensing images from Google Map and SRTM DEM images were used to identify Horan basin borders.
In the second method, the principle of data integration was represented by extracting the quantitative values of the morphometric c
... Show MoreWith the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show More