The paper aims to identify the impact of discrete realization strategy in the development of reflective thinking among students: (males/females) of Qur'an and Islamic education departments for the course of Islamic jurisprudence according to the variability of sex. The researcher used the experimental approach and adopted an experimental determination with a set part of the two groups (experimental and controlled). He selected the sample deliberately which consists of (147) students spread over four classes (experimental males/ experimental females/ controlled males/ controlled females), and it took last for an academic year of (2010-2011). He, then, prepared a post test to measure the reflective thinking with his five skills (skill of optical vision, skill of detecting fallacies, skill of reaching conclusions, skill of convincing explanations, and skill of proposed solutions) in the course of (Islamic jurisprudence) which consists of (25) items of multiple choice, each one has (5) options. The validity of the items was verified with sincerity of the content, certified arbitrators, internal consistency, as well as applied to the external exploratory sample to measure the level of difficulty, strength of the discriminatory, and effective of the alternatives, were all items acceptable according to the dependable standards. Then, the researcher comes out with the stability coefficient by the retail midterm, in which level of stability reached (0.79) according to Pearson equation, and it reached (0.88) after correction according to Spearman - Brown equation, and this is a good stability coefficient for the test. Moreover, after processing data for the test of the post reflective thinking of the sample concerned in the paper by using (t-test) for two independent samples, the study showed a statistically significant difference between the two groups, and in a favour for the experimental group that studied according to the strategy of (discrete realization) in all groups of (males/ females).
A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreDisease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature
... Show MoreIn this paper, the structure of and have been introduced and studied. We also obtain that a is of a if and only if there exists an on such that . In addition, we obtain that of if and only if there is an on such that , where are subspaces of with eigenvalues 1 and −1, respectively. We also find t that the existence of on implies that there exists a compatible under appropriate condition.
Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThe Bangestan reservoir, which occurs in the Ahwaz oilfield, consists of the middle Cretaceous limestone Ilam and Sarvak Formations that were deposited in the Zagros Basin. The reservoir is divided into ten Zones (A to J) formed in the upper Albian-Santonian and contains considerable hydrocarbon accumulations. The limestones were deposited on an extensive shallow carbonate platform on a passive margin and are dominated by rudist biostrome and grainstone facies. Paleogeographical changes mean that identification of the facies is complex. Seismic stratigraphy and isotopic data are used to better understand the structural and geological setting and develop an understanding of the sedimentary environment. The results show that the rudist biostr
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show More