Preferred Language
Articles
/
jcoeduw-564
Self- Awareness of Emotions and its Relation to the Way of Helping of Kindergardens' Children
...Show More Authors

The self-awareness interactions reflects with emotions,assess the child in respect to its relations with the social standards; they are not merely simply reactions , but rather they connect with his moral behavior and other 's thinks. When the self- awareness gets developed with emotions within the child , the latter become highly sensitive, causing him prone to be blamed . AS a result , the children test the self –awareness interactions with emotions and in age 3 years , where the self –awareness interactions with emotion clearly link to the self- assessment. The children in stage of kindergarten could not describe the self-awareness interactions accurately ; they test it under different circumstances in comparison to the youngest one. Based on the recommendations of emotionally child bringing up conference held in Cairo in 2007, it is necessitated to concern over the official and semi- official educational institutions that could have an emotion effect upon the child ; besides, the conference also confirmed to study the child emotionally and how to promote it for bringing up a new generation endowing with strong will and sincere ( Al-Hawarna- 2007). The study has indicated that the self-awareness with emotions and its integration with others have a relation to appear behavior problems within the children and having a big role on the psychological and social development for the children. The self-awareness with emotions has an important impact on the children for a success in life and for preserving the relations with the family and colleagues. If the children are not to be aware with their emotions , they will find difficulty in making decisions logically or to get integrated with others ; thus , they have an opportunity to response to the social attitudes to help others in correct ways and to avoid the decisions that lead to incorrect results( Elias and Weissber 2000). The two researchers have indicated that the child needs to learn some vocabularies indicating to emotions and feelings and reasons for such reasons and other alternatives in order for the child to have an opportunity to represent his emotions to be used in correct way. . ( Al-Shimari-2005) sees that the method of assistance represents as a means for social interaction having clear effect in the exchange between the individual and his family and between the individual and others ( Al-Shimari , 2005, 98). The current research aims to : Measure the self- awareness with emotions with the kindergarten children ( sample of the research males and females ) Measure the method of assistance within the kindergarten children ( sample of the research males and females ) Knowing the relationship between the self- awareness with emotion and integration with others among the kindergarten children. ( males and Females) For verifying goals of the research , the researcher has prepared three scales ( scale of self-awareness with emotion, scale of integration with others and scale of assistance ) . For ascertaining the reliability and consistence, the three scales have been applied on the sample 400 child who have been randomly chosen from 20 kindergartens . After processing the statistic data , the scales have been applied on the basic sample 600 child who have been randomly chosen . The researcher has reached to the following results: The sample of the research of females enjoys with self-awareness with emotion. The sample of the research of females enjoys with integration with others The research sample of females enjoys with the method of assistance.The integration with others is consistent relationship , the more the integration with others gets increased , the more the self-awareness with emotion increase. The more the method of assistance increases , the more self-awareness with emotion increases. The independent variables affect the method of assistance. In the light of the results , the researcher has submitted a set of recommendations and suggestions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 20 2024
Journal Name
Ingénierie Des Systèmes D Information
Enabling Technologies for Ultra-Low Latency and High-Reliability Communication in 6G Networks
...Show More Authors

View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Applied Nursing Research
Examining perceived and actual diabetes knowledge among nurses working in a tertiary hospital
...Show More Authors

View Publication
Scopus (29)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Mon Aug 21 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
Delay in eco-epidemiological prey-predator model with predation fear and hunting cooperation
...Show More Authors

It is recognized that organisms live and interact in groups, exposing them to various elements like disease, fear, hunting cooperation, and others. As a result, in this paper, we adopted the construction of a mathematical model that describes the interaction of the prey with the predator when there is an infectious disease, as well as the predator community's characteristic of cooperation in hunting, which generates great fear in the prey community. Furthermore, the presence of an incubation period for the disease provides a delay in disease transmission from diseased predators to healthy predators. This research aims to examine the proposed mathematical model's solution behavior to better understand these elements' impact on an eco-epidemi

... Show More
View Publication
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Intelligent Systems
Void-hole aware and reliable data forwarding strategy for underwater wireless sensor networks
...Show More Authors
Abstract<p>Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co</p> ... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (25)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (7)
Scopus Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Neuroquantology
Electronic Transfers and (NLO) Properties Predicted by AB Initio Methods with Prove Experimentally
...Show More Authors

Hartree-Fock (HF) method relies in the calculations of nonlinear optical properties (NLO) for benzoic acid molecule. Also, another theoretical study is conducted by using the TD-DFT Density Functional Theory through B3LYP/High Base Set 6-311++G (2d,2p) on Gaussian program09. Moreover, an experimental study has been done to obtain the electrons spectrum for benzoic acid with and without ethanol. While the experimental study is done by using UV/VIS. spectrophotometer. Energy gap values of electronic transition between HOMO and LUMO is obtained from theoretical and experimental results. Consequently, the theoretical result for determining the energy gap calculated from EHOMO-LUMO wasvery close to the results of UV / VIS. spectrum. A theoretica

... Show More
View Publication
Scopus (31)
Crossref (22)
Scopus Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (230)
Crossref (227)
Scopus Clarivate Crossref