The study aimed to evaluate educational programs efficiency in applying the best educational practices to educate students from the dangers of indecent behaviors, in line with higher education policy and the appropriateness of educational program dimensions to spread awareness among students to not fall into the indecent behaviors clutches. The study adopted the inductive exploratory approach through structural equation modeling and the descriptive analysis of the collected data from randomly selected sample (n=385) from educational academics at Northern Border University in the Saudi Arabia using a specially designed survey tool to meet study purposes to evaluate dimensions of teaching methods, evaluation tools, training courses, course descriptions, and technology use. Findings showed that overall means were medium, and regression coefficients of the five dimensions of current educational program were acceptable and less than (0.5), which confirms the efficiency of the educational program in combating indecent behaviors, with exception of significance impact of both course description and technology use from females' perspectives. The course description had the lowest percentage of saturation in terms of confirming factor analysis with a value of (0.26) and its negative correlation with the use of technology. In addition the study set many recommendations.
يعد تحليل السلاسل الزمنية من المواضـيع الهامة في تفسير الظـواهر التي تحدث خلال فترة زمنية معينة. ان الهدف من هذا لتحليل هو الحصـول على وصف وبنـاء أنموذج مناسب من اجل اعطاء صورة مستقبلية واضحة للسلاسل الزمنية المدروسة وان السلاسل الزمنية اهم الادوات المستخدمة في بناء وتقدير والتنبؤ بالظواهر المختلفة وان الاستدامة المالية هي الحالة التي تكون فيها الدولة قادرة على الوفاء بالتزاماتها الحالية والمستقبلية من غي
... Show MoreIn the subject area (participation and tandem), the study showed the views of Mr. Sadr in this field when researching first: the issue of the necessity of these two phenomena in the language that some imams of the language and principles called for to discuss and respond to, and
Use the accounting system of responsibility in assessing the performance of the company profit centers of the leather industry Given the importance of the profit centers of the General Company for Leather Industries, where a circle of activity that is accountable responsible for them (the director) about what is happening with costs and achieve revenues other words, the profit center is the beginning of an independent company with revenues and costs contribute to achieving the objectives of the company as a whole, which is to achieve profits, which means the comprehensive work of the centers of the need to evaluate its performance permanent depending on the conversion rates of the Interior. It was relied on the company's production
... Show MoreIn this study, an improved process was proposed for the synthesis of structure-controlled Cu2O nanoparticles, using a simplified wet chemical method at room temperature. A chemical solution route was established to synthesize Cu2O crystals with various sizes and morphologies. The structure, morphology, and optical properties of Cu2O nanoparticles were analyzed by X-ray diffraction, SEM (scanning electron microscope), and UV-Vis spectroscopy. By adjusting the aqueous mixture solutions of NaOH and NH2OH•HCl, the synthesis of Cu2O crystals with different morphology and size could be realized. Strangely, it was found that the change in the ratio of de-ionized water and NaOH aqueous solution led to the synthesis of Cu2O crystals of differen
... Show MoreThe objective of this article is to delve into the intricate dynamics of marriage relationships, exploring the impact of emotions such as fear, love, financial considerations and likability. In our investigation, we adopt a perspective that acknowledges the nonlinear nature of interactions among individuals. Diverging from certain prior studies, we propose that the fear element within the context of marriage is not a singular, isolated factor but rather a manifestation resulting from the amalgamation of numerous social issues. This, in turn, contributes to the emergence of strained and unsuccessful relationships. Unlike conventional approaches, we extensively examine the conditions essential for the existence of all socially signifi
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreThis paper analyzes the effect of scaling-up model and acceleration history on seismic response of closed-ended pipe pile using a finite element modeling approach and the findings of 1 g shaking table tests of a pile embedded in dry and saturated soils. A number of scaling laws were used to create the numerical modeling according to the data obtained from 1 g shake table tests performed in the laboratory. The current study found that the behaviors of the scaled models, in general have similar trends. From numerical modeling on both the dry and saturated sands, the normalized lateral displacement, bending moment, and vertical displacement of piles with scale factors of 2 and 35 are less than those of the pile with a scale factor of 1 and the
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show More