573 research outputs found
The Impact of Kagan Models in Reducing Disruptive Behaviors and Academic Achievement in Science Education Among Jordanian Eighth Graders
The current study aims at identifying the impact of Kagan Models in reducing disruptive behavior among Jordanian eighth graders and any consequent effect on their school achievement. The study was conducted on a sample of 42 male students assigned randomly into experimental and control groups with 21 students each. Those in the experimental group were taught using kagan models, and those in the control group were taught with the traditional method. Data was collected by using pre- test as a baseline and post- test as summative for both groups; in addition a questionnaire was completed by 12 teachers, to identify Kagan Models. Effect in reducing disruptive behaviors among students. Results showed statistically significant differences (α = 0.05) in eighth graders achievement, where experimental outperformed controls. Additionally kagan models effect in reducing disruptive behaviors among eighth graders at (α = 0.05) were found. Keywords: academic achievement, disruptive behaviors, eighth graders, kagan mode
Ein mehrschichtiges sicheres Framework für Fahrzeugsysteme
In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems distributed throughout the car, known as Electronic Control Units (ECUs). Each one of these ECUs runs a number of software components that collaborate with each other to perform various vehicle functions. Modern vehicles are also equipped with wireless communication technologies, such as WiFi, Bluetooth, and so on, giving them the capability to interact with other vehicles and roadside infrastructure. While these improvements have increased the safety of the automotive system, they have vastly expanded the attack surface of the vehicle and opened the door for new potential security risks. The situation is made worse by a lack of security mechanisms in the vehicular system which allows the escalation of a compromise in one of the non-critical sub-systems to threaten the safety of the entire vehicle and its passengers. This dissertation focuses on providing a comprehensive framework that ensures the security of the vehicular system during its whole life-cycle. This framework aims to prevent the cyber-attacks against different components by ensuring secure communications among them. Furthermore, it aims to detect attacks which were not prevented successfully, and finally, to respond to these attacks properly to ensure a high degree of safety and stability of the system.In den letzten Jahren wurden bedeutende Entwicklungen im Bereich der Fahrzeuge vorgestellt, die die Fahrzeuge zu einem Netzwerk mit vielen im gesamten Fahrzeug verteile integrierte Systeme weiterentwickelten, den sogenannten Steuergeräten (ECU, englisch = Electronic Control Units). Jedes dieser Steuergeräte betreibt eine Reihe von Softwarekomponenten, die bei der Ausführung verschiedener Fahrzeugfunktionen zusammenarbeiten. Moderne Fahrzeuge sind auch mit drahtlosen Kommunikationstechnologien wie WiFi, Bluetooth usw. ausgestattet, die ihnen die Möglichkeit geben, mit anderen Fahrzeugen und der straßenseitigen Infrastruktur zu interagieren. Während diese Verbesserungen die Sicherheit des Fahrzeugsystems erhöht haben, haben sie die Angriffsfläche des Fahrzeugs erheblich vergrößert und die Tür für neue potenzielle Sicherheitsrisiken geöffnet. Die Situation wird durch einen Mangel an Sicherheitsmechanismen im Fahrzeugsystem verschärft, die es ermöglichen, dass ein Kompromiss in einem der unkritischen Subsysteme die Sicherheit des gesamten Fahrzeugs und seiner Insassen gefährdet kann. Diese Dissertation konzentriert sich auf die Entwicklung eines umfassenden Rahmens, der die Sicherheit des Fahrzeugsystems während seines gesamten Lebenszyklus gewährleistet. Dieser Rahmen zielt darauf ab, die Cyber-Angriffe gegen verschiedene Komponenten zu verhindern, indem eine sichere Kommunikation zwischen ihnen gewährleistet wird. Darüber hinaus zielt es darauf ab, Angriffe zu erkennen, die nicht erfolgreich verhindert wurden, und schließlich auf diese Angriffe angemessen zu reagieren, um ein hohes Maß an Sicherheit und Stabilität des Systems zu gewährleisten
Recommended from our members
A comprehensive numerical model for simulating two-phase flow in shale gas reservoirs with complex hydraulic and natural fractures
Increase in energy demand has played a significant role in the persistent exploitation and exploration of unconventional oil and gas resources. Shale gas reservoirs are one of the major unconventional resources. Advancements in horizontal drilling and hydraulic fracturing techniques have been the key to achieve economic rates of production from these shale gas reservoirs. In addition to their ultra-low permeability, shale gas reservoirs are characterized by their complex gas transport mechanisms and complex natural and induced (hydraulic) fracture geometries. Production from shale gas reservoirs is predominantly composed of two-phase flow of gas and water. However, proper modeling of the two-phase behavior as well as incorporating the complex fracture geometries have been a challenge within the industry. Due to the limitation of the local grid refinement (LGR) approach, hydraulic fractures are assumed to be planar (orthogonal), which is an unrealistic assumption. Although more flexible approaches are available, such as the use of unstructured grids, they require significantly high computational powers.
In this research, an efficient embedded discrete fracture model (EDFM) is introduced to explicitly model complex fracture geometries. The EDFM approach is capable of explicitly modeling complex fracture geometries without increasing the computational demand. Utilizing EDFM alongside a commercial simulator, a 3D reservoir model is constructed to investigate the effect of complex fracture geometries on the two-phase flow of a shale gas well. In this investigation, varying degrees of hydraulic fracture complexity with 1-set and 2-set natural fractures were tested. The simulation results confirm the importance of properly modeling fracture complexity, highlighting that it plays an integral part in the estimation of gas and water recoveries. In addition, the simulation results hint to the pronounced effect of fracture interference as fracture complexity increases. Finally, variable fracture conductivities and initial water saturation values were analyzed to further assess their effect on the two-phase production behavior of the shale gas well.
This study examines the effect of non-orthogonal complex fracture geometry on the two-phase flow of shale gas wells. The work can provide a significant insight toward understanding the extent to which fracture complexity can affect the performance of shale gas wells.Petroleum and Geosystems Engineerin
Customer allocation targeted for broadband services in South Africa using predictive analytics
In this capstone project, we propose a solution to the business problem being facing by one of the satellite companies in UAE, Yahsat. They are providing broadband (internet) services through satellite for wide area in the world including Middle East, Asia and Africa. Specifically, in South Africa, they noticed that they are losing some customers and at the same time the number of customers is not as what was anticipated when they entered the business there. So, increasing the number of customers will increase the revenue, which is the main goal of the company. For Yahsat Company to achieve their business goals, different predictive analytics models were designed and developed in order to come up with a decision scheme that will evaluate each of the areas’ characteristics and give a weight for each characteristic. That will allow to come up with a model/solution that will be able to determine the most profitable areas to focus on each city in that specific country. These areas have been studied along with graphs, figures, and statistical results
Resisting Translation: The Control Policy on Translation in the Arab World with Reference to Jordan
This paper investigates the influence of the control policy on translation in the Arab World and in Jordan particularly. It sheds light on the issues of the control policy, the raison d'être behind applying it in the Arab world, the translators’ role as decision makers (superiority or inferiority towards the language), its forms, and who controls what. Furthermore, this paper is an attempt to reach a better understanding of the circumstances of the influence of covert forms that led to resisting translating. Keywords: control policy, norms, translation, colonialism, conspiracy theory, the Othe
A Review Study of Error Analysis Theory
Up until the late sixties, the prominent theory in the field of second language acquisition or learning was almost behaviouristic, which claimed that the learning was a result of acquiring a set of new language patterns. Hence, second language errors were considered as only the result of learners' mother tongue habits in the target language. Errors which were not explained based on this assumption will definitely be underestimated. Therefore, there was a need for another approach in order to clearly describe second language learners' errors. Given this, the current study aims at reviewing and discussing the Error Analysis theory in terms of theoretical foundations, theoretical assumptions, limitations and significance of this theory. This review reveals that despite the criticism that this theory has received, it still plays a fundamental role in investigating, identifying and describing second language learners' errors and their causes. Most importantly, Error Analysis can enable second language teachers to find out different sources of second language errors and take some pedagogical precautions towards them. Moreover, Error Analysis can provide a good methodology for investigating second language learners' errors. Once the causes or sources of errors are discovered, it is probable to conclude and decide on the remedy
The meaning of Al-Mukhalafah according to the scholars of Osul and its applications in the Jordanina Law
This work deals with Mafhum Al-Mukhalfah and its importance in the Jordanian Law, and the attitude of Muslim scholars towards it, some of these scholars see it as a document in Islamic Law and others reject it because it does not lead to the correct result.
This study has reached several results; the most important one, Mafhum Al-Mukhalafah, has been applied in the Jordanian Law and has given successful results
Dimethyl Sulfoxide (DMSO) has an Additive Effect and Alters Minimal Inhibitory Concentrations of Antifungal Drugs
Background: Dimethyl sulfoxide (DMSO) iscommonly used as a solvent for anti-fungal drugs. It hasbeen reported to possess anti-fungal activity by itself somay interfere in the evaluation and comparison of antifungaldrugs. DMSO 1% and below are usually consideredto possess insignificant effect on the growth of fungi. Thepresent study was aimed to determine anyadditive/synergistic effect of DMSO (1%) with anti-fungaldrugs.Methods: The effect of DMSO (1%) was determined onthe colonial growth of Trichophyton rubrum, andMicrosporum canis along with clotrimazole, griseofulvin,ketoconazole and thymoquinone (an active principle ofNigella sativa). Similarly, the ability of DMSO (1%) toenhance the effect of amphotericin-B and thymoquinonewas observed on the growth of Aspergillus niger. The fungiwere grown in three sets of plates of dermasel agar foreach drug containing: (a) serial dilutions of the drug alone;(b) serial dilutions of the drug plus DMSO 1% in eachdilution and (c) dermasel agar alone, as control.Results: DMSO (1%) lowered the MICs of all drugstested against the fungi used, except amphotericin-Bagainst Aspergillus niger. Presence of DMSO (1%) in serialdilutions of drugs also significantly shifted the growthcurves of fungi towards right.Conclusion: DMSO, as a solvent, is one of theimportant factors that can alter the results of antifungaldrugs
The Effect of Flipped Learning on Islamic Education Achievement among United Arab Emirate' Tenth Graders and Their Attitudes Towards It
This study aimed at finding out the effect of flipped learning on Islamic education achievement of tenth graders in the United Arab Emirates as well as their attitudes towards it. The study sample consisted of two sections of 10th grades for boys one as experimental group from Remah school consisted of (21) students taught by the flipped learning strategy and control group of (20) students from Alkhazna school taught by the conventional method, semi experimental design was used, where the achievement test prepared by researchers was administered on both groups, pre and post treatment, in addition to the scale of attitudes towards flipped learning which was administered on experimental group. Results showed statistically significant differences of (α = 0.05) level in student’s achievement where experimental out performed controls, further more strong positive attitudes towards flipped learning among experimental were found. Keywords: Flipped learning, achievement, student’s attitude, tenth grade
Offensive Hebrew Corpus and Detection using BERT
Offensive language detection has been well studied in many languages, but it
is lagging behind in low-resource languages, such as Hebrew. In this paper, we
present a new offensive language corpus in Hebrew. A total of 15,881 tweets
were retrieved from Twitter. Each was labeled with one or more of five classes
(abusive, hate, violence, pornographic, or none offensive) by Arabic-Hebrew
bilingual speakers. The annotation process was challenging as each annotator is
expected to be familiar with the Israeli culture, politics, and practices to
understand the context of each tweet. We fine-tuned two Hebrew BERT models,
HeBERT and AlephBERT, using our proposed dataset and another published dataset.
We observed that our data boosts HeBERT performance by 2% when combined with
D_OLaH. Fine-tuning AlephBERT on our data and testing on D_OLaH yields 69%
accuracy, while fine-tuning on D_OLaH and testing on our data yields 57%
accuracy, which may be an indication to the generalizability our data offers.
Our dataset and fine-tuned models are available on GitHub and Huggingface.Comment: 8 pages, 1 figure, The 20th ACS/IEEE International Conference on
Computer Systems and Applications (AICCSA
- …