Preferred Language
Articles
/
jperc-1362
The Effect of Educational Program Based on the (Guttmann) Model for Developing Awareness and Emotional Experience among University Students
...Show More Authors

Abstract

The aim of the research is to identify the level of awareness and emotional experience among university students and to identify the effect of the educational program based on (Guttmann) model for developing awareness and emotional experience among university students by verifying the validity of the following zero hypotheses: 1) There are no statistically significant differences in the development of awareness and emotional experience among university students at the level of (0.05) between the mean scores of the experimental group in the pre and post-tests. 2) There are no statistically significant differences in the development of awareness and emotional experience among university students at the level of (0.05) between the mean scores of the control group in the pre and post-tests. 3) There are no statistically significant differences in the development of awareness and emotional experience among university students at the level of (0.05) between the mean scores of the experimental group and the mean scores of the control group in the post-test. The researchers developed an instrument for measuring awareness skills and emotional experience through a question posed about how to respond to emotional situations and the individual’s ability to emotionally control through and after the emotional situation. The two researchers developed an educational program based on the Guttmann model, which consisted of (16) lessons that continue for (50) minutes of each lesson. The experimental group consisted of (40) students: (20) males, and (20) females selected intentionally from the first class at the College of Basic Education. A pre-test was conducted to find out awareness skills and emotional experience. The experimental pre-posttest design with a single group was chosen as it fits the research sample. The findings of the research revealed there is a statistically significant difference in the level of awareness skills and emotional experience after exposure to the program. There are no statistically significant differences in the development of awareness skills and emotional experience among university students, as well as between the mean scores of the control group in the pre and post-tests. There are statistically significant differences between the mean scores of the experimental group and the control group in the post-test in developing awareness skills and emotional experience in favor of the experimental group. The researchers presented a set of recommendations and suggestions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 09 2020
Journal Name
Construction Research Congress 2020
Alternative Risk Models for Optimal Investment in Portfolio-Based Community Solar
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
2018 9th International Conference On Information And Communication Systems (icics)
An intersection-based segment aware algorithm for geographic routing in VANETs
...Show More Authors

In networking communication systems like vehicular ad hoc networks, the high vehicular mobility leads to rapid shifts in vehicle densities, incoherence in inter-vehicle communications, and challenges for routing algorithms. It is necessary that the routing algorithm avoids transmitting the pockets via segments where the network density is low and the scale of network disconnections is high as this could lead to packet loss, interruptions and increased communication overhead in route recovery. Hence, attention needs to be paid to both segment status and traffic. The aim of this paper is to present an intersection-based segment aware algorithm for geographic routing in vehicular ad hoc networks. This algorithm makes available the best route f

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Sun Feb 13 2022
Journal Name
Petroleum & Coal
Laboratory-Based Correlations to Estimate Geomechanical Properties for Carbonate Tight Reservoir.
...Show More Authors

Rock mechanical properties are critical parameters for many development techniques related to tight reservoirs, such as hydraulic fracturing design and detecting failure criteria in wellbore instability assessment. When direct measurements of mechanical properties are not available, it is helpful to find sufficient correlations to estimate these parameters. This study summarized experimentally derived correlations for estimating the shear velocity, Young's modulus, Poisson's ratio, and compressive strength. Also, a useful correlation is introduced to convert dynamic elastic properties from log data to static elastic properties. Most of the derived equations in this paper show good fitting to measured data, while some equations show scatters

... Show More
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet-Based Feature Extraction for Cassava Classification: A Machine Learning Approach
...Show More Authors

Cassava, a significant crop in Africa, Asia, and South America, is a staple food for millions. However, classifying cassava species using conventional color, texture, and shape features is inefficient, as cassava leaves exhibit similarities across different types, including toxic and non-toxic varieties. This research aims to overcome the limitations of traditional classification methods by employing deep learning techniques with pre-trained AlexNet as the feature extractor to accurately classify four types of cassava: Gajah, Manggu, Kapok, and Beracun. The dataset was collected from local farms in Lamongan Indonesia. To collect images with agricultural research experts, the dataset consists of 1,400 images, and each type of cassava has

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Perceptually Important Points-Based Data Aggregation Method for Wireless Sensor Networks
...Show More Authors

The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the

... Show More
View Publication Preview PDF
Scopus (62)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
The effect of the green value chain in reducing environmental failure costs
...Show More Authors

The research aims to apply the activities of the green value chain as one of the modern administrative techniques that economic units resort to develop solutions to the pollution problems that occur due to the activity of economic units and their products that may cause damage to the environment as well as the waste of natural resources and to identify the production of environmentally friendly products and reduce the costs of environmental failure of both types Internal and external that may be borne by economic units such as taxes, fines and compensation due to nonobservance of environmental requirements and the preservation of human health and protection of the environment. To achieve the goal of the research, the researchers rel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 04 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effect of Iodine Overdose on Thyroid Hyperplasia
...Show More Authors

Objectives: study the relation between the effect of time (long time duration) with high concentration of iodine
and study its effect on the activity of the thyroid gland (hormonal and histological changes).
Methodology: An experimental study was done on (30) albino rats (8 weeks of age) to know the effect of high
concentration of iodine on the activity of the thyroid gland (hormonal and histological changes) related with
time. The study last for six months for the period of 1/2/2007 to 31/7/2007, the experiment was carried out in the
research lab. of pathology department, College of Medicine, University of Baghdad.
Results: The study shows changes in hormonal levels of thyroid hormones (T3 & T4) and also histologic

... Show More
View Publication Preview PDF