Preferred Language
Articles
/
jperc-1576
Content Assessment of the Sciences Textbooks of Grades (1-4) in the Light of International Standards in Mathematics and Science TIMSS 2019 (Cognitive Process Dimension)
...Show More Authors

The current research aims to determine the requirements of Trends of International Mathematics and Science Study (TIMSS 2019) and to find out the extent to which the content of science textbooks for grades (1-4) in the Sultanate of Oman includes the requirements of (TIMSS 2019). Only the Cognitive Process dimension has been considered when conducting the analysis. The study population includes all science books from the first to the fourth grade for the academic year 2021-2022. The study identified and organized the requirements in the study tool, which is a list of requirements of (TIMSS 2019). After confirming its validity and reliability, the analysis was performed, and data were collected and analyzed statistically using frequencies and percentages. The results showed that all domains (knowledge, Applying, and Reasoning) and all cognitive skills for each domain were included in each grade, but the percentages included in the books differed always from those specified in the requirements of (TIMSS 2019). The rank of the included domains in grades 1, 3, and 4, were as follows: first, knowledge, second, Applying, and finally, Reasoning, which is the same rank proposed by (TIMSS 2019). However, the rank for grade 2 was different where Applying came first while Reasoning and knowledge came in the second and third ranks respectively. When frequencies and ratios were calculated for each of the three domains of cognitive processes cumulatively over the four years (1-4), an interesting result popped out. The percentage included for each of the three domains is close to the percentages specified by (TIMSS 2019). This means that the science textbooks (Cambridge) designed for students from the first grade to the fourth grade have balanced well between the percentages included and the percentages specified by (TIMSS 2019), but over the four years and not over one year only, as the difference between the percentages included and the percentages specified by (TIMSS 2019) in the field of knowledge was about 6.5 percentage points in favor of the percentage included, and the difference in the field of Applying was about 4.5 points Percentage in favor of the specified percentage. As for Reasoning, the difference was less than two points only in favor of the specified percentage, which means that there is a relatively greater focus on knowledge and relatively less on Applying and Reasoning.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 01 2024
Journal Name
The Saudi Dental Journal
Different pulp capping agents and their effect on pulp inflammatory response: A narrative review
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Journal Of Structural Engineering
Standard Pushout Tests and Design Rules for a Bolted–Welded Hybrid Demountable Shear Connector
...Show More Authors

A bolted–welded hybrid demountable shear connector for use in deconstructable steel–concrete composite buildings and bridges was proposed. The hybrid connector consisted of a partially threaded stud, which was welded on the flange of a steel section, and a machined steel tube with compatible geometry, which was bolted on the stud. Four standard pushout tests according to Eurocode 4 were carried out to assess the shear performance of the hybrid connector. The experimental results show that the initial stiffness, shear resistance, and slip capacity of the proposed connector were higher than those of traditional welded studs. The hybrid connector was a ductile connector, according to Eurocode 4, with slip capacity higher than 6 mm. A nonli

... Show More
View Publication
Scopus (14)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Breast Cancer MRI Classification Based on Fractional Entropy Image Enhancement and Deep Feature Extraction
...Show More Authors

Disease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Image encryption based on combined between linear feedback shift registers and 3D chaotic maps
...Show More Authors

Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Engineering, Technology & Applied Science Research
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence
...Show More Authors

In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Sumer 1
Biologically synthesized Copper Nanoparticles from S. epidermidis on resistant S. aureus and cytotoxic assay
...Show More Authors

The risk of significant concern is resistance to antibiotics for public health. The alternative treatment of metallic nanoparticles (NPs), such as heavy metals, effects on antibiotic resistance bacteria with different types of antibiotics of - impossible to treat using noval eco-friendly synthesis technique nanoparticles copper oxide (CuO NPs) preparation from S. epidermidis showed remarkable antimicrobial activity against S.aureus Minimum inhibitory concentra range (16,32,64,256,512) µg/ml via well diffusion method in vitro, discover those concentrations effected in those bacteria and the best concentration is 64 µg/ml, characterization CuO NPs to prove this included atomic force microscope, UV, X-ray Diffraction and TEM, and ant

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Developing Arabic License Plate Recognition System Using Artificial Neural Network and Canny Edge Detection
...Show More Authors

            In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Sep 21 2024
Journal Name
Asian Pacific Journal Of Cancer Prevention
Oncolytic Newcastle Disease Virus and Photodynamic Therapy as Dual Approach for Breast Cancer Treatment
...Show More Authors

Objective: We hypothesized that attacking cancer cells by combining various modes of action can hinder them from taking the chance to evolve resistance to treatment. Incorporation of photodynamic therapy (PDT) with oncolytic virotherapy might be a promising dual approach to cancer treatment. Methods: NDV AMHA1 strain as virotherapy in integration with aminolaevulinic acid (ALA) using low power He-Ne laser as PDT in the existing work was examined against breast cancer cells derived from Iraqi cancer patients named (AMJ13). This combination was evaluated using Chou–Talalay analysis. Results: The results showed an increased killing rate when using both 0.01 and 0.1 Multiplicity of infection (MOI) of the virus when combined with a dose of 617

... Show More
View Publication
Scopus Crossref