The family found itself confused any of the methods of dealing (Control - democracy) follow to reach the best level in education, what was favorite yesterday about a father dealing with his children control which showed generations characterized by high levels of self-esteem and decision-making, today rejected and opposed it. As some believe that a sense of control generates a negative represented by fear and frustration.
Find the goal of preparing the current scale of the father control when junior high students.
To achieve this goal, has been preparing a tool to measure the father control after that, the researcher extract the validity and reliability of the scale, and then applied to a sample of 500 students from junior high school students from the fifth preparatory grade in the province of Baghdad within the departments of education Karkh first breeding Karkh second.
Results, and found that the degree of control of the center and less in terms of statistics, and means that the weak control from the point of view of the level of research sample.
And it ended the researcher develop conclusions and recommendations and proposals in accordance with the findings of the research.
This study aims to identify the degree of students of Princess Rahma University College owning e-learning skills related to MOODLE as they perceived in the of light Corona crisis. The researchers' questionnaire consisted of (37) items, distributed in three areas of e-learning skills related to the MOODLE on (147) students were chosen randomly. The results of the study showed that the degree of students 'possession of e-learning skills related to the MOODLE was significant. The results also revealed that there were statistically significant differences in the degree of students' possession of electronic learning skills related to the MOODLE due to sex in favor of females. Finally, there were no statistically significant differences in the
... Show More<span>Digital audio is required to transmit large sizes of audio information through the most common communication systems; in turn this leads to more challenges in both storage and archieving. In this paper, an efficient audio compressive scheme is proposed, it depends on combined transform coding scheme; it is consist of i) bi-orthogonal (tab 9/7) wavelet transform to decompose the audio signal into low & multi high sub-bands, ii) then the produced sub-bands passed through DCT to de-correlate the signal, iii) the product of the combined transform stage is passed through progressive hierarchical quantization, then traditional run-length encoding (RLE), iv) and finally LZW coding to generate the output mate bitstream.
... Show MoreWas expanded display high reflectivity of the spectral remote infrared (m j 14-8) adoption order Alcolmtin ????????? thickness optical northeastern quarter wavelength and compared with results of previous studies based Aldrashalhalah on Ndharah matrix distinctive amended and fall of light close to the vertical arrangement multilayer materials buffer and in thin films homogeneous and uniform properties deposited on germanium basis results showed that the best choice for governments and their kills to expand bandwidth high reflectivity is much easier for the infrared than the area visible in addition to the order of these stacks is the cornerstone of the filters other visual...
High performance work systems and general industrial enterprise performance
Variable selection in Poisson regression with high dimensional data has been widely used in recent years. we proposed in this paper using a penalty function that depends on a function named a penalty. An Atan estimator was compared with Lasso and adaptive lasso. A simulation and application show that an Atan estimator has the advantage in the estimation of coefficient and variables selection.
Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show More