The research seeks to design a program of guidance in the form of emotional perception rational to reduce the fear of failure, to identify the effect of method of emotional perception rational in reducing the fear of failure. To achieve these objectives, the researcher adopted the null-hypotheses, which assume there are no statistically significant differences in the degree of fear of failure (for the control group) in the pre-posttest. There are no statistically significant differences in the fear of failure (for the experimental group) in the pre-posttest. There were no statistically significant differences in the fear of failure of the groups (experimental and control) after the application of the program in the post-test. In order to test the hypotheses, the researcher used an experimental design with partial control (experimental group design and control group with pre-posttest). The sample consisted of (20) athletes and was randomized to two equal groups of a control group and an experimental group. The equivalence of the two groups was carried out in some variables (pre-test scores, age of months, the academic achievement of the father, academic achievement of the mother, and economic status). The method of emotional perception was applied to the experimental group while no method was provided for the control group. It constructed the measure of fear of failure, which has (26) paragraphs. The results showed that the application of the guiding method (rational emotional perception) had an effect in reducing the fear of failure. In light of the results of the research, the researcher put forward a number of recommendations and suggestions.
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreOptical properties of chromium oxide (Cr2O3) thin films which were prepared by pulse laser deposition method, onto glass substrates. Different laser energy (500-900) mJ were used to obtain Cr2O3 thin films with thickness ranging from 177.3 to 372.4 nm were measured using Tolansky method. Then films were annealed at temperature equal to 300 °C. Absorption spectra were used to determine the absorption coefficient of the films, and the effects of the annealing temperature on the absorption coefficient were investigated. The absorption edge shifted to red range of wavelength, and the optical constants of Cr2O3 films increases as the annealing temperature increased to 300 °C. X-ray diffraction (XRD) study reveals that Cr2O3 thin films are a
... Show MoreStorage of rainwater within the root depth zone is one of the modern ways to increase plant production. Subsurface water retention technology was applied to assess improving values of crop yield and crop water use efficiency, applying a membrane made of low-density polyethylene trough installed below the crop root zone. The goal of this paper is to assess that the retention of rainwater above the membrane can improve the crop yield and crop water use efficiency values for winter wheat. The experiment was conducted in open field, within Joeybeh Township, located in east of the Ramadi City, in Anbar Province, in winter growing season 2018-2019. Two plots T1 (with membrane trough) and T2 (without membrane) were used for the
... Show MoreRecently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele
... Show MoreAbstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show MoreA Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated vi
... Show MoreYeasts are distributed in all environments and have been reported as potential biocontrol agents against various phytopathogenic fungi. To investigate their enzymatic and biological activities, 32 yeasts were isolated from 15 date vinegar samples. Evaluation of the antagonistic activities of isolated yeasts against the plant pathogens Fusarium oxysporium, Sclerotinia sclerotiorum, and Macrophomina phaseolina indicated that there are two yeasts had the highest inhibitory effect against plant pathogens, these yeasts identified as Kluyveromyces marxianus and Torulaspora delbrueckii using traditional and molecular methods. These yeast isolates were tested for fungal cell wall degrading enzymes (in vitro), and results indicated that the
... Show More
