Active learning is a teaching method that involves students actively participating in activities, exercises, and projects within a rich and diverse educational environment. The teacher plays a role in encouraging students to take responsibility for their own education under their scientific and pedagogical supervision and motivates them to achieve ambitious educational goals that focus on developing an integrated personality for today’s students and tomorrow’s leaders. It is important to understand the impact of two proposed strategies based on active learning on the academic performance of first-class intermediate students in computer subjects and their social intelligence. The research sample was intentionally selected, consisting of 99 students. The experimental group comprised 33 students from division (B) who were taught according to the first proposed strategy, while the second experimental group, represented by division (A), and also consisted of 33 students. The control group, made up of 33 students from division (C), was taught using the usual method. Two tools have been prepared: an achievement test with 40 items and a measure of social intelligence consisting of 20 items. The research results indicated that the experimental groups, which utilized the first and second proposed strategies based on active learning, outperformed the control group. As a result, several conclusions, recommendations, and proposals were made.
Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreLeap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F
... Show MoreThe study aimed to identify the perceptions of social studies teachers in the Governorate of Muscat about the importance of employing the skills of the twenty-first century in teaching. The study employed a qualitative approach. The two researchers used an analytical approach based on the Grounded Theory, the data was gathered through semi-structured interviews with (15) male and female teachers. The results indicated that social studies teachers relate the twenty-first-century skills more to improving students’ achievement level in the subject, while they see that these skills have less influence in developing students’ communication skills and cooperation with their peers. In light of the results of the study, the two researchers r
... Show MoreWith the growing number of Internet users, public and private arts activities have become increasingly popular. Adolescents have begun to establish aesthetic taste and new cultural values. This category is the most affected one by the published images and ideas especially in the social networking space and specifically the Facebook. It is the most important problem in their cultural composition. This research aims to detect the problems of social networking sites in nurturing the aesthetic taste of adolescents. The researcher used the analytical descriptive approach to obtain accurate information describing the current situation or depicting the social reality of adolescents. The research concluded that the public discourse in social med
... Show MoreAbstract
Objectives: The present study designed to explore the genotoxicity through measurement of Mitotic index in bone marrow and the spleen cells, as possible mechanism of bone marrow and spleen toxicity that induced by irinotecan; and to describe the protective actions of omega 3 against irinotecan induced genotoxicity in bone marrow and the spleen of rats.
Methods: Twenty four (24) rats (Sprague-Dawley) were randomly divided into four groups: Group Ӏ, rats received single oral daily dose of distilled water (2 ml/kg) for 25 days (negative control group); Group ӀӀ (irinotecan-treated), receiv
... Show MoreThe present study aimed to identify the extent to which the content of social and national studies courses was included in interactive thinking maps in the educational stages in the Kingdom of Saudi Arabia, and to achieve the goal of the study, the researcher used the descriptive and analytical approach, and the study tool used consisted of a content analysis card; Where it included a list of the types of thinking maps, where the study sample consisted of all social and national studies courses at the elementary and intermediate levels, and it is (12) books for the student in its first and second parts, and after verifying the validity and reliability of the tool, it was applied to the study sample, and the study reached conclusions, inc
... Show MoreJob stress is considered one of the most important obstacles that may appear in the work field. In order to deal with the obstacles and challenges , the idea to deal with job stress has come to address job stress as one of the most important trends that enable organizations to face those challenges through focusing on the role of job stress and the organizational climate of the organization.
The research deals with two variables: the job stress as an independent variable, and the organizational climate as a dependent one. Each variable includes five sub-dimensions. These dimensions have been involved in an interaction to form
... Show More