هدف البحث التعرف الى اسباب سلوك التنمر لدى طلاب الصف الاول المتوسط من وجهة نظر المدرسين والمدرسات واساليب تعديله، واستعمل الباحثان المنهج الوصفي واختيار عينة عشوائية من المدرسين والمدرسات في متوسطة أرض الرافدين ومتوسطة الرحمن للبنين وكان عددهم (46) مدرساً ومدرسة بواقع (32) مدرساً و(14) مدرسة، واعتمد الباحثان الاستبانة أداة للتعرف الى اسباب سلوك التنمر واساليب تعديله، واشارت نتائج البحث الى تنوع اسباب التنمر : ذاتية واسرية ومرتبطة بالبيئة المدرسية ومرتبطة بالبيئة المجتمعية المحيطة ومرتبطة بالإعلام والثورة التقنية ، اذ تضمنت الاستبانة (45) سبباً من أسباب سلوك التنمر المدرسي ، واشتملت استبانة اساليب تعديل سلوكيات التنمر المدرسي على (32) اسلوباً مرتبة تنازليا بحسب وسطها المرجح ووزنها المئوي، وفي ضوء نتائج البحث تبلورت بعض الاستنتاجات والتوصيات والمقترحات
Terrorist crime is considered a serious act that outweighs all other crimes in terms of impact and result, because it has a wide range on societies, and it also contains a great thing of danger represented in its purpose, and here describing terrorism as a crime is a description that does not give the full right to this behavior or that it It abbreviates it and does not show its actual reality, given that terrorism contains several different crimes and the roles of its contributors, and these roles are necessary to reach the result or the end. In which each episode is complementary to the other, it is not a single act, but rather several joint and complex actions that in turn all lead to the result, and the agreement in the terrorist pro
... Show MoreObjectives: To evaluate the effect of non-pharmacological pain relief methods on duration of labor stage.
Methodology: A quasi-experimental study design was conducted during the period of (4th July 2018 through 24th October 2018) on non-probability of (60) women (30) of them were a control group and (30) were the study group whom admitted to Al-Elwyia Maternity Teaching Hospital suffering from labor pain. A questionnaire was used as a tool of data collection Descriptive& Inferential statistical analyses were used to analyze the data.
Result: The highest percentages of study and control groups were in age group (< 20) years old, primary schools graduates, housewife, from "urban area", within low category of socioeconomic scal
The aim of the research is to:. Preparation and implementation of special educational units using multimedia to learn the skill of scrolling from below. 2 to recognize the impact of the use of multimedia in learning the skill of scrolling from below. 3 to identify the differences between the tests after the two groups research in learning the skill of passing from the bottom volleyball. The research represented the students of the first stage and the sample of the research was drawn randomly and the number of (50) students were divided into two experimental and control groups and each group (25) students were used standardized tests and conducting pre-tests and the implementation of the main exp
... Show MoreThis paper suggest two method of recognition, these methods depend on the extraction of the feature of the principle component analysis when applied on the wavelet domain(multi-wavelet). First method, an idea of increasing the space of recognition, through calculating the eigenstructure of the diagonal sub-image details at five depths of wavelet transform is introduced. The effective eigen range selected here represent the base for image recognition. In second method, an idea of obtaining invariant wavelet space at all projections is presented. A new recursive from that represents invariant space of representing any image resolutions obtained from wavelet transform is adopted. In this way, all the major problems that effect the image and
... Show MoreThe current research aims to identify the level of mental alertness among students of the Department of Chemistry in the Faculty of Education for Pure Sciences – Ibn Al-Haytham during the academic year (2022-2023). To achieve this goal, a descriptive approach was followed. The research community was identified as all chemistry students across the four grades (first, second, third, and fourth). A sample from each grade was selected for the current research. A tool was prepared to measure mental alertness within the research sample. The researcher adopted the scale by Baer, Smith, Kristemoyer, & Tany (2006), which was developed by Al-Buhairi et al. (2014), ensuring its validity, reliability, and psychometric characteristics, making i
... Show MoreThere many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma
... Show MoreThe world is currently challenging the serious effects of the pandemic of the Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2). Data on pediatric COVID are rare and scattered in the literature. In this article, we presented the updated knowledge on the pediatric COVID-19 from different aspects. We hope it will increase the awareness of the pediatricians and health care professionals on this pandemic.
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show More