The child spends several hours watching animated films, which affect their behavior negatively and positively. This calls parents to monitor what their children are watching, to show them the serious risks of some violent films, and to direct them toward choosing both positive and educational programs that develop their positive behavior. This study aimed to explore the positive and negative effects of watching animation films as well as to identify the role animation films in increasing the cognitive knowledge of kindergarteners. To do this, the descriptive and analytical methods were used. A questionnaire was adopted as a tool for data collection. A scale of (45) items classified into three categories was applied on the random research sample of 200 mothers of children enrolled in kindergartens in Baghdad, within Karkh district (Directorate of Education in Karkh 1 and the Directorate of Education in Karkh 2). The findings of this study revealed that animation films have many positive and negative effects that significantly can be observed on the behavior of kindergarteners. Moreover, Animation films play an important role in increasing the knowledge of kindergarten children. The study came out with a conclusion; a large percentage of children in our society are addicted to watching animated films. The most important recommendations and proposals recommended by the study are: 1. Parents should work on organizing their children's hours, such as reducing their hours of watching animation films, which takes more time than other needs such as playing, sleeping, eating, and reviewing their lessons. 2. Parents must educate themselves by recognizing the effects of animation flims on children to avoid their risks. 3. The correct and serious awareness of individuals in society about the extent of the negative effects of television and the risks of the content of programs that threaten the ethics, beliefs, culture, and health of our children.
Credential compromise is one of the most widespread security threats, allowing adversaries to bypass traditional authentication measures and impersonate legitimate users. Traditional intrusion detection systems are often based on network-level or macro-behavioral indicators, which can be easily spoofed by an attacker, thus compromising the effectiveness of those mechanisms. This study presents an improved adaptive intrusion detection system to authenticate user behavior based on micro-digital behavioral profiling. It involves the use of timing of keystrokes, micro-mouse, navigation in the application, and interaction rhythm signatures. The proposed system uses a hybrid model consisting of Long Short-Term Memory (LSTM) sequence predi
... Show MoreSingle long spiral tube column pressure swing adsorption (PSA) unit, 25 mm diameter, and 6 m length was constructed to study the separation of water from ethanol at azeotropic concentration of 95 wt%. The first three meters of the column length acted as a vaporizer and the remaining length acted as an adsorber filled by commercial 3A zeolite. The effect of pressure, temperature and feed flow rate on the product ethanol purity, process recovery and productivity were studied. The results showed that ethanol purity increased with temperature and pressure and decreased with feed flow rate. The purity decreased with increasing productivity. The purity range was 98.9 % to 99.6 %, the recovery range was 0.82 to 0.92 and the productivity range w
... Show MoreHere, we found an estimation of best approximation of unbounded functions which satisfied weighted Lipschitz condition with respect to convex polynomial by means of weighted Totik-Ditzian modulus of continuity
The theory of Topological Space Fiber is a new and essential branch of mathematics, less than three decades old, which is created in forced topologies. It was a very useful tool and played a central role in the theory of symmetry. Furthermore, interdependence is one of the main things considered in topology fiber theory. In this regard, we present the concept of topological spaces α associated with them and study the most important results.
The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ r
... Show MoreBackground: The access cavity is a critical stage in root canal therapy and it may influence the subsequent steps of the treatment. The new minimally invasive endodontic access cavity preparation concept aims to preserve sound tooth structure by conserving as much intact dentine as possible including the pulp chamber's roof, to keep the teeth from fracturing during and after endodontic treatment. While there is great interest in such access opening designs in numerous publications, still there is a lack of scientific evidence to support the application of such modern access cavity designs in clinical practice. This review aims to critically examine the literature on minimal access cavity preparations, explain the effect of minimally inva
... Show MoreThe dependence of the energy losses or the stopping power for the energies and the related penetrating factor are arrive by using a theoretical approximation models. in this work we reach a compatible agreement between our results and the corresponding experimental results.
The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ rates
... Show MoreThe aim of the research to apply TD-ABC technology to determine the idle capacity of the central oil companies (oil field east of Baghdad), as a modern cost management technology based on time-oriented activities (TD-ABC) is used by industrial companies in general and oil companies on In particular to build a sustainable Calvinist pillar and make future decisions by identifying idle energy to gain it a competitive advantage, the descriptive analytical approach has been adopted in calculating and analyzing the company’s data for 2018, and the most prominent conclusions of this research are managing idle energy and the task of applying cost technology on the basis of time-oriented activities and providing Convenient spatial infor
... Show More