Preferred Language
Articles
/
jperc-1106
Analytical Study of Mathematics Textbooks in the Basic Education Stage in the Sultanate of Oman According to NCTM Standards
...Show More Authors

The present study aimed to identify the availability of the National Council of Teachers of Mathematics (NCTM) standards in the content of mathematics textbooks at the basic education stage in the Sultanate of Oman. The study used the descriptive-analytical approach, adopting the method of content analysis through using a content analysis tool that included (43) indicators distributed on the four NCTM standards related to the field of geometry, after verifying their validity and reliability. The study population consisted of mathematics textbooks (first and second semesters) for ninth-grade students in the Sultanate of Oman in the academic year 2018/2019, while the sample consisted of Geometry units in the content of those books, which are (5) units in the two semesters. The researchers used specific and accurate procedures during the analysis process, by relying on the topic as a unit of analysis, the paragraph as a unit for recording, the criteria and indicators as categories for analysis, and then calculating the frequencies and percentages of the number of times the indicators were included in the content of those books. The findings of the study revealed that the percentage of including NCTM standards and indicators in the content of the mathematics books for the ninth grade in the Sultanate of Oman was weak with regard to some indicators and very weak and non-existent with respect to most indicators. Therefore, the study recommended the need to develop the mathematics curriculum in the Sultanate of Oman, especially textbooks, taking into account international standards in mathematics education, as well as the philosophy and aspirations of Omani society.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Mathematical Modelling Of Engineering Problems
Enhanced Prosthesis Control Through Improved Shoulder Girdle Motion Recognition Using Time-Dependent Power Spectrum Descriptors and Long Short-Term Memory
...Show More Authors

Surface electromyography (sEMG) and accelerometer (Acc) signals play crucial roles in controlling prosthetic and upper limb orthotic devices, as well as in assessing electrical muscle activity for various biomedical engineering and rehabilitation applications. In this study, an advanced discrimination system is proposed for the identification of seven distinct shoulder girdle motions, aimed at improving prosthesis control. Feature extraction from Time-Dependent Power Spectrum Descriptors (TDPSD) is employed to enhance motion recognition. Subsequently, the Spectral Regression (SR) method is utilized to reduce the dimensionality of the extracted features. A comparative analysis is conducted between the Linear Discriminant Analysis (LDA) class

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Microcontroller – Based Spectrum Analyzer
...Show More Authors

This work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.

... Show More
View Publication
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
حول أسلوب تحليل التغاير المتعدد باستخدام تصميم قطع منشقة
...Show More Authors

Analysis of Covariance consider to be quite important procedure to reduce the effect of some independents factors before going through the experiment.

By this procedure we can compare variances causes from the difference between treatments and error term variance of they are equals or less than consider to be not significant, otherwise if is significant.

We carry on with this comparison until we find the greatest covser for the significant variance flam the treatments.

There are methods can be used like least significant difference method, Duncan method and Turkeys' w-procedure and Student Newman.

Key Word: Analysis of variatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 24 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Securing digital documents using digital watermarking
...Show More Authors

     The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents.  But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..

In this research LSB  technique  has been used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 06 2007
Journal Name
كلية التربية البدنية وعلوم الرياضة/جامعة بغداد .
تأثير التمرينات الاوكسجينية واللاأوكسجينية في الوحدة التدريبية لتطوير بعض القدرات الوظيفية والبدنية للاعبي كر ة القدم بعمر (13-14)سنة. رسالة ماجستير
...Show More Authors

Publication Date
Mon Jan 07 2019
Journal Name
Arab Science Heritage Journal
تعيين عنصر الزئبق السام بتراكيز نزرة في نماذج غذائية ومائية مختلفة باستخدام منظومة بخار الزئبق البارد المرتبطة مع جهاز الامتصاص الذري اللهبي
...Show More Authors

الخلاصة

     يتضمن البحث تعيين عنصر الزئبق السام بتراكيزنزرة عالية الدقة (نانوغرام) باستخدام منظومة يخار الزئبق البارد لنماذج غذائية (لحوم حمراء ، لحوم بيضاء ) مختلفة ونماذج مائية (ماء النهر، مياه صناعية ، ماء الشرب) وربط المنظومة بتقنية الامتصاص الذري اللهبي.

     ان عنصر الزئبق من اشد العناصر سمية وان التراكيز المسموح بها عالميا لايتعدى جزء واحد

View Publication Preview PDF
Publication Date
Sun Mar 26 2023
Journal Name
Arab Science Heritage Journal
الاديب الكاتب والمؤرخ الفقيه يحيى بن خلدون (ت 780هـ/ 1379م) كاتب ديوان الانشاء في دولة بني زيان (633-962هـ/ 1235-1554م) بتلمسان
...Show More Authors

    A prominent figure such as Yahya bin Khaldoun and a scholar of the moroccan countries in the medieval era, and had a special place in the history of the country and the state of Bani Zayan, and the positions he occupied in it and left his scientific, literary and historical traces, leaving him an imprint in the course of history and its events, and in this study
I dealt with the research: his personal life : his name and lineage, then his upbringing and his family.

    The aim of the study is to know this character in the details of his personal and scientific life, according to the historical descriptive research method, including description and presentation of events, and linking them in a

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
تحليل أبعاد سلوكيات المواطنة التنظيمية لعينة من تدريسي جامعة بغداد
...Show More Authors

The research considers The Analysis Dimensions of The organizational citizen ship Behavior for a sample of the Faculty of the university of Baghdad through the five Dimensions of citizenship ((Altruism– couscientiosness– sportsmanship courtesy– civic virtue))

The sample contains (120) professor from four colleges of the Baghdad university.

The most Important conelusion is the rise of citizenship behavior level for the Iraqi professor through his generaliaed compliance for most dimensions of the citizenship behavior the most important recommanelations  presenteel in research is the encouragement and development for this behavior because of its oby viosis impact on the p

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Horan Valley Basin Geomorphological Aspects Assessment by Integrating Hypsometric Analysis with Remotely Sensed Morphometric Characteristics
...Show More Authors

     The extraction, study, and accurate interpretation of the morphology database of a basin are the basic blocks for building a valid geomorphological understanding of this basin. In this work, a new approach is presented which is to use three different GIS based methods to extract databases with specific geographical information and then use the concept of information intersection to make a realistic geomorphological perspective for the study area.

In the first method, data integration of remote sensing images from Google Map and SRTM DEM images were used to identify Horan basin borders.

In the second method, the principle of data integration was represented by extracting the quantitative values of the morphometric c

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref