The paper aims to identify the impact of discrete realization strategy in the development of reflective thinking among students: (males/females) of Qur'an and Islamic education departments for the course of Islamic jurisprudence according to the variability of sex. The researcher used the experimental approach and adopted an experimental determination with a set part of the two groups (experimental and controlled). He selected the sample deliberately which consists of (147) students spread over four classes (experimental males/ experimental females/ controlled males/ controlled females), and it took last for an academic year of (2010-2011). He, then, prepared a post test to measure the reflective thinking with his five skills (skill of optical vision, skill of detecting fallacies, skill of reaching conclusions, skill of convincing explanations, and skill of proposed solutions) in the course of (Islamic jurisprudence) which consists of (25) items of multiple choice, each one has (5) options. The validity of the items was verified with sincerity of the content, certified arbitrators, internal consistency, as well as applied to the external exploratory sample to measure the level of difficulty, strength of the discriminatory, and effective of the alternatives, were all items acceptable according to the dependable standards. Then, the researcher comes out with the stability coefficient by the retail midterm, in which level of stability reached (0.79) according to Pearson equation, and it reached (0.88) after correction according to Spearman - Brown equation, and this is a good stability coefficient for the test. Moreover, after processing data for the test of the post reflective thinking of the sample concerned in the paper by using (t-test) for two independent samples, the study showed a statistically significant difference between the two groups, and in a favour for the experimental group that studied according to the strategy of (discrete realization) in all groups of (males/ females).
The goal of this article is to construct fibrewise w-compact (resp. locally w-compact) spaces. Some related results and properties of these concepts will be investigated. Furthermore, we investigate various relationships between these concepts and three classes of fibrewise w-separation axioms.
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThis study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show MoreThe unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreNowadays, the use of natural bio-products in pharmaceuticals is gaining popularity as safe alternatives to chemicals and synthetic drugs. Algal products are offering a pure, healthy and sustainable choice for pharmaceutical applications. Algae are photosynthetic microorganisms that can survive in different environmental conditions. Algae have many outstanding properties that make them excellent candidate for use in therapeutics. Algae grow in fresh and marine waters and produce in their cells a wide range of biologically active chemical compounds. These bioactive compounds are offering a great source of highly economic bio-products. The prese
... Show More