573 research outputs found

    The Impact of Kagan Models in Reducing Disruptive Behaviors and Academic Achievement in Science Education Among Jordanian Eighth Graders

    Get PDF
    The current study aims at identifying the impact of Kagan Models in reducing disruptive behavior among Jordanian eighth graders and any consequent effect on their school achievement. The study was conducted on a sample of 42 male students assigned randomly into experimental and control groups with 21 students each. Those in the experimental group were taught using kagan models, and those in the control group were taught with the traditional method.  Data was collected by using pre- test as a baseline and post- test as summative for both groups; in addition a questionnaire was completed by 12 teachers, to identify Kagan Models. Effect in reducing disruptive behaviors among students. Results showed statistically significant differences (α = 0.05) in eighth graders achievement, where experimental outperformed controls. Additionally kagan models effect in reducing disruptive behaviors among eighth graders at (α = 0.05) were found. Keywords: academic achievement, disruptive behaviors, eighth graders, kagan mode

    Ein mehrschichtiges sicheres Framework für Fahrzeugsysteme

    Get PDF
    In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems distributed throughout the car, known as Electronic Control Units (ECUs). Each one of these ECUs runs a number of software components that collaborate with each other to perform various vehicle functions. Modern vehicles are also equipped with wireless communication technologies, such as WiFi, Bluetooth, and so on, giving them the capability to interact with other vehicles and roadside infrastructure. While these improvements have increased the safety of the automotive system, they have vastly expanded the attack surface of the vehicle and opened the door for new potential security risks. The situation is made worse by a lack of security mechanisms in the vehicular system which allows the escalation of a compromise in one of the non-critical sub-systems to threaten the safety of the entire vehicle and its passengers. This dissertation focuses on providing a comprehensive framework that ensures the security of the vehicular system during its whole life-cycle. This framework aims to prevent the cyber-attacks against different components by ensuring secure communications among them. Furthermore, it aims to detect attacks which were not prevented successfully, and finally, to respond to these attacks properly to ensure a high degree of safety and stability of the system.In den letzten Jahren wurden bedeutende Entwicklungen im Bereich der Fahrzeuge vorgestellt, die die Fahrzeuge zu einem Netzwerk mit vielen im gesamten Fahrzeug verteile integrierte Systeme weiterentwickelten, den sogenannten Steuergeräten (ECU, englisch = Electronic Control Units). Jedes dieser Steuergeräte betreibt eine Reihe von Softwarekomponenten, die bei der Ausführung verschiedener Fahrzeugfunktionen zusammenarbeiten. Moderne Fahrzeuge sind auch mit drahtlosen Kommunikationstechnologien wie WiFi, Bluetooth usw. ausgestattet, die ihnen die Möglichkeit geben, mit anderen Fahrzeugen und der straßenseitigen Infrastruktur zu interagieren. Während diese Verbesserungen die Sicherheit des Fahrzeugsystems erhöht haben, haben sie die Angriffsfläche des Fahrzeugs erheblich vergrößert und die Tür für neue potenzielle Sicherheitsrisiken geöffnet. Die Situation wird durch einen Mangel an Sicherheitsmechanismen im Fahrzeugsystem verschärft, die es ermöglichen, dass ein Kompromiss in einem der unkritischen Subsysteme die Sicherheit des gesamten Fahrzeugs und seiner Insassen gefährdet kann. Diese Dissertation konzentriert sich auf die Entwicklung eines umfassenden Rahmens, der die Sicherheit des Fahrzeugsystems während seines gesamten Lebenszyklus gewährleistet. Dieser Rahmen zielt darauf ab, die Cyber-Angriffe gegen verschiedene Komponenten zu verhindern, indem eine sichere Kommunikation zwischen ihnen gewährleistet wird. Darüber hinaus zielt es darauf ab, Angriffe zu erkennen, die nicht erfolgreich verhindert wurden, und schließlich auf diese Angriffe angemessen zu reagieren, um ein hohes Maß an Sicherheit und Stabilität des Systems zu gewährleisten

    Customer allocation targeted for broadband services in South Africa using predictive analytics

    Get PDF
    In this capstone project, we propose a solution to the business problem being facing by one of the satellite companies in UAE, Yahsat. They are providing broadband (internet) services through satellite for wide area in the world including Middle East, Asia and Africa. Specifically, in South Africa, they noticed that they are losing some customers and at the same time the number of customers is not as what was anticipated when they entered the business there. So, increasing the number of customers will increase the revenue, which is the main goal of the company. For Yahsat Company to achieve their business goals, different predictive analytics models were designed and developed in order to come up with a decision scheme that will evaluate each of the areas’ characteristics and give a weight for each characteristic. That will allow to come up with a model/solution that will be able to determine the most profitable areas to focus on each city in that specific country. These areas have been studied along with graphs, figures, and statistical results

    Resisting Translation: The Control Policy on Translation in the Arab World with Reference to Jordan

    Get PDF
    This paper investigates the influence of the control policy on translation in the Arab World and in Jordan particularly. It sheds light on the issues of the control policy, the raison d'être behind applying it in the Arab world, the translators’ role as decision makers (superiority or inferiority towards the language), its forms, and who controls what. Furthermore, this paper is an attempt to reach a better understanding of the circumstances of the influence of covert forms that led to resisting translating. Keywords: control policy, norms, translation, colonialism, conspiracy theory, the Othe

    A Review Study of Error Analysis Theory

    Get PDF
    Up until the late sixties, the prominent theory in the field of second language acquisition or learning was almost behaviouristic, which claimed that the learning was a result of acquiring a set of new language patterns. Hence, second language errors were considered as only the result of learners' mother tongue habits in the target language. Errors which were not explained based on this assumption will definitely be underestimated. Therefore, there was a need for another approach in order to clearly describe second language learners' errors. Given this, the current study aims at reviewing and discussing the Error Analysis theory in terms of theoretical foundations, theoretical assumptions, limitations and significance of this theory. This review reveals that despite the criticism that this theory has received, it still plays a fundamental role in investigating, identifying and describing second language learners' errors and their causes. Most importantly, Error Analysis can enable second language teachers to find out different sources of second language errors and take some pedagogical precautions towards them. Moreover, Error Analysis can provide a good methodology for investigating second language learners' errors. Once the causes or sources of errors are discovered, it is probable to conclude and decide on the remedy

    The meaning of Al-Mukhalafah according to the scholars of Osul and its applications in the Jordanina Law

    Get PDF
    This work deals with Mafhum Al-Mukhalfah and its importance in the Jordanian Law, and the attitude of Muslim scholars towards it, some of these scholars see it as a document in Islamic Law and others reject it because it does not lead to the correct result. This study has reached several results; the most important one, Mafhum Al-Mukhalafah, has been applied in the Jordanian Law and has given successful results

    Dimethyl Sulfoxide (DMSO) has an Additive Effect and Alters Minimal Inhibitory Concentrations of Antifungal Drugs

    Get PDF
    Background: Dimethyl sulfoxide (DMSO) iscommonly used as a solvent for anti-fungal drugs. It hasbeen reported to possess anti-fungal activity by itself somay interfere in the evaluation and comparison of antifungaldrugs. DMSO 1% and below are usually consideredto possess insignificant effect on the growth of fungi. Thepresent study was aimed to determine anyadditive/synergistic effect of DMSO (1%) with anti-fungaldrugs.Methods: The effect of DMSO (1%) was determined onthe colonial growth of Trichophyton rubrum, andMicrosporum canis along with clotrimazole, griseofulvin,ketoconazole and thymoquinone (an active principle ofNigella sativa). Similarly, the ability of DMSO (1%) toenhance the effect of amphotericin-B and thymoquinonewas observed on the growth of Aspergillus niger. The fungiwere grown in three sets of plates of dermasel agar foreach drug containing: (a) serial dilutions of the drug alone;(b) serial dilutions of the drug plus DMSO 1% in eachdilution and (c) dermasel agar alone, as control.Results: DMSO (1%) lowered the MICs of all drugstested against the fungi used, except amphotericin-Bagainst Aspergillus niger. Presence of DMSO (1%) in serialdilutions of drugs also significantly shifted the growthcurves of fungi towards right.Conclusion: DMSO, as a solvent, is one of theimportant factors that can alter the results of antifungaldrugs

    The Effect of Flipped Learning on Islamic Education Achievement among United Arab Emirate' Tenth Graders and Their Attitudes Towards It

    Get PDF
    This study aimed at finding out the effect of flipped learning on Islamic education achievement of tenth graders in the United Arab Emirates as well as their attitudes towards it. The study sample consisted of two sections of 10th grades for boys one as experimental group from Remah school consisted of (21) students taught by the flipped learning strategy and control group of (20) students from Alkhazna school taught by the conventional method, semi experimental design was used, where the achievement test prepared by researchers was administered on both groups, pre and post treatment, in addition to the scale of attitudes towards flipped learning which was administered on experimental group. Results showed statistically significant differences of (α = 0.05) level in student’s achievement where experimental out performed controls, further more strong positive attitudes towards flipped learning among experimental were found. Keywords: Flipped learning, achievement, student’s attitude, tenth grade

    Offensive Hebrew Corpus and Detection using BERT

    Full text link
    Offensive language detection has been well studied in many languages, but it is lagging behind in low-resource languages, such as Hebrew. In this paper, we present a new offensive language corpus in Hebrew. A total of 15,881 tweets were retrieved from Twitter. Each was labeled with one or more of five classes (abusive, hate, violence, pornographic, or none offensive) by Arabic-Hebrew bilingual speakers. The annotation process was challenging as each annotator is expected to be familiar with the Israeli culture, politics, and practices to understand the context of each tweet. We fine-tuned two Hebrew BERT models, HeBERT and AlephBERT, using our proposed dataset and another published dataset. We observed that our data boosts HeBERT performance by 2% when combined with D_OLaH. Fine-tuning AlephBERT on our data and testing on D_OLaH yields 69% accuracy, while fine-tuning on D_OLaH and testing on our data yields 57% accuracy, which may be an indication to the generalizability our data offers. Our dataset and fine-tuned models are available on GitHub and Huggingface.Comment: 8 pages, 1 figure, The 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA
    corecore