Preferred Language
Articles
/
jperc-459
Self-determintion and Emotional Experience and their Relationship with achievement striving for the college Students
...Show More Authors

Human beings have an innate and natural aim to achieve their self-interests and to show their ability to overcome challenges in a better way, therefore the move towards self determination is expressed by intrinsic motivation. The desire of absorbing in this task is to enjoy the task in it self and benefitting from it such a motivation is the desire rooted in human nature to judge and choose in which individual is conscious in his self, abilities and adequacy that help him in control the different  situations of life passed by him. His choices and actions are voluntary  and non-restricted to intervention or external control because control is inner and subjective, while his behavior is self-regulated with the feeling of independence, that is the feeling of psychological freedom and the motivation of self-determination. with this independence, human being enjoys power and psychological health as they are necessary for health , integration and  happiness. Self –determination is regarded as humane , civilized and social phenomenom whose association indicating positively self-wellbeing , general health, creativity and achievement  in most fields of active life. The importance of self-determination required its study and acquainting with it and the emotional experience and their relationship with achievement striving.

The present research aims to:

  1. Acquainting with self-determination for the college students.
  2. Acquainting with emotional experience for the college students.
  3. Acquainting with achievement striving for the college students.
  4. Acquainting with the significance differences in self-determination for the college students according to two variables : gender “males, females” and major “scientific,humanistic”
  5. Acquainting with the significant differences in emotional experience for the college students according to two variables :gender “males, females” and major “scientific , humanistic”
  6. Acquainting with the significant differences in achievement striving for the college students according to two variables : gender “males, females “ major “scientific , humanistic”
  7. The extent of contribution of self-determination and emotional experience in total variance of achievement striving for the college students.

To achieve the research aims, the researcher built three scales for the present research and verified their valdity and analysed their items statistically on a sample consisting of 600 male and female college students to find discriminate power and validity for their  items.

The reliability of scales was computed by the re-test way and cronbach’s  alpha.

After completing of scales ‘ building , they were applied on the researcher’s main sample

‘400 male and female students” . having collected the data and processed them statistically, the researcher reached several findings , the most important of them as follows:

  1. The mean of self-determination degrees for the research sample was higher than the hypothetical mean and that indicates that sample subjects have high self-determination.
  2. The mean of emotional experience degrees for the sample was higher than the hypothetical mean and that indicates that sample subjects have high emotional experience.
  3. The mean of achievement striving degrees was higher than the sample have high motivation for achievement  striving .

In the light of these findings and as completion for the fields associated with the present  resarch, and the researcher recommended several of recommends as she suggested conducting several scientific studies and researches.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 17 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Dynamic Channel Assignment Using Neural Networks
...Show More Authors

This paper presents a proposed neural network algorithm to solve the shortest path problem (SPP) for communication routing. The solution extends the traditional recurrent Hopfield architecture introducing the optimal routing for any request by choosing single and multi link path node-to-node traffic to minimize the loss. This suggested neural network algorithm implemented by using 20-nodes network example. The result shows that a clear convergence can be achieved by 95% valid convergence (about 361 optimal routes from 380-pairs). Additionally computation performance is also mentioned at the expense of slightly worse results.

View Publication Preview PDF
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Path Planning of an autonomous Mobile Robot using Swarm Based Optimization Techniques
...Show More Authors

This paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of AC

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 31 2018
Journal Name
Journal Of Engineering
Seismic Response of Nonseismically Designed Reinforced Concrete Low Rise Buildings
...Show More Authors

In this paper, the time-history responses of a square plan two-story reinforced concrete prototype building, considering the elastic and inelastic behavior of the materials, were studied numerically. ABAQUS software was used in three-dimensional (3D) nonlinear dynamic analysis to predict the inelastic response of the buildings. Concrete Damage Plasticity Model (CDPM) has been used to model the inelastic behavior of the reinforced concrete building under seismic excitation. The input data included geometric information, material properties, and the ground motion. The building structure was designed only for gravity load according to ACI 318 with

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 31 2017
Journal Name
Journal Of Engineering
Static Analysis of Laminated Composite Plate using New Higher Order Shear Deformation Plate Theory
...Show More Authors

 In the present work a theoretical analysis depending on the new higher order . element in shear deformation theory for simply supported cross-ply laminated plate is developed. The new displacement field of the middle surface expanded as a combination of exponential and trigonometric function of thickness coordinate with the transverse displacement taken to be constant through the thickness. The governing equations are derived using Hamilton’s principle and solved using Navier solution method to obtain the deflection and stresses under uniform sinusoidal load. The effect of many design parameters such as number of laminates, aspect ratio and thickness ratio on static behavior of the laminated composite plate has been studied. The

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Study of Catalysts Deactivation in Isomerization Process to Produce High Octane Gasoline
...Show More Authors

In this study  the isomerization of desulfuerized light Iraqi petroleum naphtha (Al-Dura Refinery) with boiling point range of 37 to 124 °C , 80.5 API specific gravity and 68.2 octane number has been investigated. Two types of catalysts were prepared (Pt/HX and Pt/SrX) by impregnation of 0.8 wt% Pt on l 3X-zeolite. The catalyst activity and selectivity toward isomerization, and catalyst deactivation were investigated.

The isomerization unit consisted of a vertical tubular stainless steel reactor of 2 cm internal diameter, 3 cm external diameter and 68 cm height. The operating pressure was atmospheric for all experimental runs.  The liquid flow of light­naphtha was 0.4 Uh, and the catalyst weight was 50 gm, H/

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Preparation of Polyester/ Micro Eggshell Fillers Composite as Natural Surface Coating
...Show More Authors

    To fabricate an inexpensive surface coating with excellent mechanical properties with good water resistance and thermal diffusion, white eggshell fibers with particle size (~1micrometer) has been added by different weight percentages (1,2,3,4,5,6,7 and 8 %) to Unsaturated Polyester.

The weight ratio (4%) of eggshell powder is a good ratio to be added to polyester to improve its mechanical properties, such as hardness, impact strength, and wear resistance. The hardness was improved by (3.75%); impact strength has the same value as polyester, flexural strength by (8.43%) and high improvement in wear resistance (74.4%), as well as to get further improvements in mechanical properties of polyester, the eggshell powder was added

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fuzzy Semimaximal Submodules
...Show More Authors

     Let R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if

 the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are  introduced and given some  properties .

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu May 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Generalized Regular Continuous Functions In Topological Spaces
...Show More Authors

In this paper we introduce a new type of functions called the generalized regular
continuous functions .These functions are weaker than regular continuous functions and
stronger than regular generalized continuous functions. Also, we study some
characterizations and basic properties of generalized regular continuous functions .Moreover
we study another types of generalized regular continuous functions and study the relation
among them

View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More