922 research outputs found

    The Effect Of The Modified Cort Programme In Enhancing Critical Thinking And Improving Motivation To Learn Among Students With Learning Difficulties In Mathematics

    Get PDF
    The purposes of this study were to construct a training programme based on the CoRT programme and to measure its effects in enhancing critical thinking (CT) and improving motivation to learn for sixth grade student with Learning Difficulties (LDs) in mathematics in Jordan. Tujuan kajian ini adalah untuk membina satu program latihan berdasarkan program CoRT dan menilai keberkesanannya dalam meningkatkan pemikiran kritikal dan motivasi untuk belajar bagi pelajar tahun enam yang mempunyai masalah pembelajaran dalam subjek matematik di Jordan

    Securing End-to-End Wireless Mesh Networks Ticket-Based Authentication.

    Get PDF
    Hybrid wireless mesh network (WMN) consists of twotypes of nodes: Mesh Routers which are relatively static andenergy-rich devices, and Mesh Clients which are relativelydynamic and power constrained devices. In this paper we presenta new model for WMN end-to-end security which divideauthentication process into two phases: Mesh Access Point phasewhich based on asymmetric cryptography and Mesh Client phasewhich based on a server-side certificate such as EAP-TTLSand PEAP

    SWMPT: Securing Wireless Mesh Networks Protocol Based on Ticket Authentication

    Get PDF
    Wireless mesh network (WMN) consists of two parts: mesh access points which are relatively static and energy-rich devices, and mesh clients which are relatively dynamic and power constrained. In this paper, we present a new model for WMN end-to-end security which divides authentication process into two phases: Mesh Access Point which is based on asymmetric cryptography and Mesh Client which is based on a server-side certificate such as EAP-TTLS

    Securing End-to-End Wireless Mesh Networks Ticket-Based Authentication

    Get PDF
    Hybrid wireless mesh network (WMN) consists of two types of nodes: Mesh Routers which are relatively static and energy-rich devices, and Mesh Clients which are relatively dynamic and power constrained devices. In this paper we present a new model for WMN end-to-end security which divide authentication process into two phases: Mesh Access Point phase which based on asymmetric cryptography and Mesh Client phase which based on a server-side certificate such as EAP-TTLS and PEAP

    The impact of the blockade in creating and strengthening dominant positions that may violate the competition law in Qatar

    Get PDF
    بدأت آثار الحصار الذي فرضته بعض الدول على دولة قطر تظهر ملامحه عن قرب. واحدة من هذه الآثار هي ما نتج عن إغلاق للحدود البرية والجوية من قطع لتدفق البضائع والمنتجات إلى دولة قطر بهدف إرباك الأسواق وتفريغها من المنتجات وإشاعة الهلع بين المواطنين والمقيمين. مما لا شك فيه أنّ توقّف حركة السّلع والبضائع "من" و"عبر" دول الحصار سيُساهمُ في تقليل الموارد الواردة للشركات القطريّة، وسَيُقلِّلُ كذلك من فرص المنافسة، مِمّا يعني تِباعًا خلق أو تعزيز فرضيّات إنشاء مراكز مهيمنة قد تكون مخالفة لقانون المنافسة إذا أسيء استغلال هذه المراكز المهيمنة. لكلّ ذلك؛ لا بد من بيان الدور الجوهري الذي يلعبه الحصار في خلق وتعزيز المراكز المهيمنة، مع إبراز الدور الواجب اتّخاذه من طرف سلطات المنافسة في دولة قطر لمنع إساءة استغلال هذه المراكز بما يُخالف القانون لقطري لحماية المنافسة ومنع الممارسات الاحتكارية.The features of the effects of the blockade imposed by some countries on the State of Qatar have begun to show. One of these effects is the results of the land, sea and air blockade from the disruption of the flow of goods and products to the State of Qatar in order to disrupt the markets, unload them of products, and spread panic among citizens and residents. Undoubtedly, the cessation of the transaction of goods and products “from” and “through” the blockading states may contribute to reducing the resources received by the Qatari market and will reduce the chances of competition. This will lead to creating or strengthening the presumptions of establishing dominant positions that may be contrary to the competition law if these dominant positions were abused. Thus, the fundamental role played by the blockade in creating and strengthening dominant positions must be clarified, while highlighting the role to be taken by the competition authorities in the State of Qatar to prevent the misuse of these positions in contravention of the Qatari law of Protection of Competition and Prevention of Monopolistic Practices

    EDUCATIONAL EFFICIENCY OF THE TEACHERS OF STUDENTS WITH INTELLECTUAL DISABILITIES IN THE GOVERNORATE OF KERAK

    Get PDF
    The current study aims to know to what level teachers of students with intellectual disabilities have educational efficiency in the governorate of Kerak. To achieve the targets of this study, both researchers used the descriptive curricula, and the study tool was prepared to reveal how much teachers of students with intellectual disabilities have educational efficiency; whereas the tool consisted of (four) main dimensions that include (57) paragraph, both researchers developed it and extracted the necessary evidences of validity and stability, where they are distributed on (82) teachers of students with intellectual disabilities; where expected value, standard deviation and analysis of variance were used. Results of the study indicated that the level of educational efficiency of teachers for all dimensions of the study, was above average, and it was found that there are differences in the experience and qualification variables, but sex and sector did not have any statistical indicating effect

    EDUCATIONAL EFFICIENCY OF THE TEACHERS OF STUDENTS WITH INTELLECTUAL DISABILITIES IN THE GOVERNORATE OF KERAK

    Get PDF
    The current study aims to know to what level teachers of students with intellectual disabilities have educational efficiency in the governorate of Kerak. To achieve the targets of this study, both researchers used the descriptive curricula, and the study tool was prepared to reveal how much teachers of students with intellectual disabilities have educational efficiency; whereas the tool consisted of (four) main dimensions that include (57) paragraph, both researchers developed it and extracted the necessary evidences of validity and stability, where they are distributed on (82) teachers of students with intellectual disabilities; where expected value, standard deviation and analysis of variance were used. Results of the study indicated that the level of educational efficiency of teachers for all dimensions of the study, was above average, and it was found that there are differences in the experience and qualification variables, but sex and sector did not have any statistical indicating effect

    CHAP : Enabling efficient hardware-based multiple hash schemes for IP lookup

    Get PDF
    Building a high performance IP lookup engine remains a challenge due to increasingly stringent throughput requirements and the growing size of IP tables. An emerging approach for IP lookup is the use of set associative memory architecture, which is basically a hardware implementation of an open addressing hash table with the property that each row of the hash table can be searched in one memory cycle. While open addressing hash tables, in general, provide good average-case search performance, their memory utilization and worst-case performance can degrade quickly due to bucket overflows. This paper presents a new simple hash probing scheme called CHAP (Content-based HAsh Probing) that tackles the hash overflow problem. In CHAP, the probing is based on the content of the hash table, thus avoiding the classical side effects of probing. We show through experimenting with real IP tables how CHAP can effectively deal with the overflow. © IFIP International Federation for Information Processing 2009

    An Overview on Cryptococcal Meningitis

    Get PDF

    DENDRITIC CELLS TRANSFECTED WITH AUTOLOGOUS SIV RNA: POTENTIAL AIDS VACCINE

    Get PDF
    The need for a therapeutic human immunodeficiency virus (HIV) vaccine is urgent for the control of the acquired immunodeficiency syndrome (AIDS) epidemic. The variability of the virus as well as its ability to undergo escape mutations in T cell epitopes are important obstacles facing the development of an AIDS vaccine. Consequently, a powerful strategy would be the induction of robust antigen specific T cell responses targeting patient-specific virus sequences expressed during the course of infection. An attractive vaccine approach to achieve this is the use of dendritic cells (DC) transfected with in vitro transcribed mRNA encoding autologous virus sequences. The rhesus macaque model provides an ideal preclinical setting to test the therapeutic potential of DC-based vaccination. We hypothesize that optimal antigen presentation and stimulation of potent T cell responses could be achieved by loading DC from SIV-infected macaques with mRNA encoding virus-derived sequences isolated during the course of infection. This represents a powerful strategy for the generation of a potential therapeutic AIDS vaccine. In support of our hypothesis, we generated the following evidence: (1) nucleofection is a superior method for efficient transfection of human and monkey monocyte-derived DC with DNA and mRNA to conventional electroporation and lipofection; (2) nucleofection of DC with mRNA led to better protein expression and DC maturation as compared to DNA transfection; (3) mRNA nucleofection of DC resulted in rapid and sustained gene expression, a critical factor in DC-based immunotherapy for durable antigen presentation; (4) nucleofection of monkey monocyte-derived DC with wild-type non codon-optimized gag mRNA was efficiently expressed and induced strong antigen-specific T cell responses whereas DNA transfection led to non-specific T cell stimulation; (5) enhanced CD4+ T cell responses were observed when Gag was redirected to the lysosomal pathway via the targeting signal of the lysosome-associated membrane protein (LAMP-1) following nucelofection of DC with mRNA; (6) rhesus DC transfected with lysosome-targeted gag mRNA encoding an escape mutation in an immunodominant CTL epitope stimulated CD4+ and CD8+ T cell responses of almost equivalent magnitude directed towards undefined epitopes outside of the mutated region; (7) gag or env mRNA transfected-DC from SIV-infected macaques stimulated significant antigen-specific T cell responses in an entirely autologous system; (8) DC cotransfected with gag mRNA as well as mRNA encoding CD70 or OX40L did not result in enhanced immunostimulatory functions. HIV/AIDS is a significant public health problem demanding action. This work demonstrates that mRNA-transfected DC expressing SIV antigen from infected monkeys stimulate broad and relevant T cell responses, thus supporting this approach for the generation of a therapeutic HIV vaccine to decrease the burden associated with the infection
    corecore