Preferred Language
Articles
/
jcoeduw-168
Awareness of the problem technological poisoning Media of parents of kindergarten children and their teachers
...Show More Authors

The childhood stage is considered the most important stage of all the stages through
the human being’s life. In this stage the human being will be more affected by the various
factors that surround him/her. The first five years of his/her life leave a great impact not only
on the human being personality, but also on his/her whole life. Therefore, it is worthwhile tobe concerned with and focus at the raising up and the teaching of the child during the
childhood stage.
The mission of raising up children in this era - the era of globalization and information
bursting or news flooding – has become a very difficult or even an impossible mission.
Furthermore, not only in the Arabic world, but also all over the world, this era has become a
depressing and a disappointing era to many serious parents and teachers, who seek the fact
and care about both their children’s benefit and the benefit of those who raise them up.
Children are seen to be more accepting to and more connecting with the building up of
civilization. The parent’s attentiveness and the level of their educational maturity will define
the level of family evolution and its role in affecting the child’s personality.
Eventually, all these matters go back to the shortage in the environmental attentiveness
and its relation to the health of the human beings. All these leads to the problem discussed in
this research which is the revealing of the attentiveness by the problem of technological media
poisoning of the children’s parents and their teachers.
The aim of this research is to be acquainted with:
 The attentiveness of the technological media poisoning in the members of the sample.
 The attentiveness of the technological media poisoning in the kindergarten teachers.
 The differences in the attentiveness of the technological media poisoning.
 between the kindergarten children’s parents and the children’s teacher.
This research is limited the children’s parents and teachers of the kindergartens in
Baghdad for the academic year 2012-2013.
In order to achieve the goal of this research, the researcher has performed a scale of the
attentiveness of the technological media poisoning according to the scientific steps in the
construction of the psychological scales.
To approve the truth of the scale to be introduced to a number of experts. After
straightening some of the scale items, (33) the of the scale has been approved.
Moreover, the researcher uses statistical analysis for the items by calculating the
distinctive power, which proves that all the items of the scale are distinctive and statistically
significant. The researcher tries to find out the relation between the degree of the item and the
total degree.
The validity of the scale has been approved by repeating the test. The validity factor is
(0.86), which proves that the validity factor is reliable. In the application of the Falkronbach
formula, it has been found that the validity factor is (0.93). This proves that the validity factor
is reliable.
The scale has been applied on (600) members of the sample, whichcontains randomly
chosen children’s parents and kindergarten teachers.
The result of the research are as follows:
 All the members of the sample have attentiveness of the technological media poisoning.
 The children’s parents have attentiveness of the technological media poisoning.
 The kindergarten teachers have attentiveness of the technological media poisoning.
 There are differences in attentiveness between all the members of the sample to the
benefit of the mothers side.
The researcher has introduced a number of recommendations and suggestions, which
are going to be discussed later.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 15 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Combining Convolutional Neural Networks and Slantlet Transform For An Effective Image Retrieval Scheme
...Show More Authors

In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),

... Show More
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Consistency and Consistency in Contemporary Iraqi Painting - Selected Models-: حسين شاكر قاسم العيداني
...Show More Authors

  The tagged research is concerned with observation and investigating the concepts of consistency and harmony in contemporary Iraqi painting (selected models) in order to reveal the mechanisms and rules of these two concepts in the artistic field and their mechanisms of operation. How reflected tools Consistency and harmony in contemporary Iraqi painting? What is consistency and what are its mechanisms and principles? Is consistency a unit product quality? Are there similarities between consistency and harmony? What is harmony and its principles and rules? As for the second chapter, it included two topics that dealt with the first topic - consistency and harmony between concept and significance, while the second topic meant - histor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
Ironic Metonymy in Russian and Arabic : Ироническая метонимия в русском и арабском языках
...Show More Authors

This article is devoted to the cognitive study of ironic metonymy in Russian and Arabic. Metonymy and irony have traditionally been seen as parallel linguistic phenomena. But their formation and interpretation are based on different cognitive mechanisms. At the formal and functional level, metonymy and irony have a number of significant differences. Metonymy is an artistic technique, the mechanism of which is based on obvious, easily traced connections between objects and phenomena of the surrounding world. Irony is a satirical technique or a rhetorical figure that is used to create a certain artistic image, aimed at forming the hidden meaning of the statement. A native speaker intuitively feels the difference between metonymy and irony

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (242)
Crossref (241)
Scopus Clarivate Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Iraqi Rural Singing and National Identity: مصطفى عباس السوداني-عبد الحليم أحمد حسن
...Show More Authors

Singing has significant importance being a major basis for the expressive and cultural production of the societies and a real companion that reflects their artistic career and is strongly connected to the reality of the peoples and the production of the individuals, who are geniuses of arts and culture.
Rural singing represents one of the most well-known artistic singing styles in Iraq, which truly embodied the Iraqi national identity. However, it remained confined to the countryside and did not spread due to the lack of mass media and the recording technologies at that time. It has been pure virgin singing art. The theoretical framework is divided into three axes:

• The Iraqi singing heritage in the twentieth century, a hi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (259)
Crossref (195)
Scopus Clarivate Crossref
Publication Date
Thu Jun 20 2024
Journal Name
Ingénierie Des Systèmes D Information
Enabling Technologies for Ultra-Low Latency and High-Reliability Communication in 6G Networks
...Show More Authors

View Publication Preview PDF
Scopus (23)
Crossref (14)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Suggestive Framework for Applying Performance and Programs Budget in Iraqi Government Units Environment
...Show More Authors

Abstract

This research  aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This  is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that

... Show More
View Publication Preview PDF
Crossref (1)
Crossref