The childhood is an important stage in building the character of the individual and where children acquire the most important experiences . providing proper growth requirements of the things follows assist them in achieving a stable and together Childhood is the violence of indicators that can determine whether personal or illness social .the social circumstances experienced community Iraqi and continues through crises successive wars and explosions and the displacement and that these events may lead to changes in the social behavior of individuals and may contribute to the spread of violence in Iraqi society and observed various forms in (home, school, street, and work), so it was natural that a child the first affected by these waves of violence for many reasons related to younger age and kids love to imitate adults and observe their behavior, particularly parents so you must pay attention to the behavior of their impact on the child's personality and psychosocial compatibility within the family and society. From the above it can sum up the problem of the current search the following question:- - Is the psychological and social compatibility has to do with the phenomenon of violence among pre-school children? Through the above it can be released importance of research of the following things. -The current research (within the knowledge of researcher), which dealt with the study of violence for being cause great harm to the individual and society because of its raised serious psychological and social structure of the individual. And on the structure of the family and the community.. -it stvdis an important stage in the life of the individual .oha early childhood If we can build upon together without crises will be reflected on the internal stability and compatibility psychosocial in the next stages -The current research (within the knowledge of researcher) researcher), the first attempt, which dealt with the study of the psychological and social compatibility and its relationship to the phenomenon of violence in early childhood. The current research aimed to:- The children pre-school psycho-social compatibility scale.- Measurement of the phenomenon of violence among children, pre-school -Correlation between the phenomenon of violence and psycho-social compatibility with pre-school children In order to achieve the objectives of the research were adopted psychosocial compatibility measure, prepared by (al-Janabi in 2002) and the scale of violence, prepared by Hayali 2009) where the measvyesbeen applied on a sample of children aged 4-6 years, reaching its size (200 ) boy and girl after extracting the validity and reliability of the two. In doing data analysis through answers parameters were reached: - - that the children of pre-school malnourished in the psychological and social well for them - that children of pre-school stage suffer from the phenomenon of violence among them. - There is an inverse correlation between the negative psychological and social harmony between the phenomenon of violence among a sample search relationship The backing of these results and the researcher developed a number of recommendations and suggestions can be used by educational and community institutions.
In this work, an explicit formula for a class of Bi-Bazilevic univalent functions involving differential operator is given, as well as the determination of upper bounds for the general Taylor-Maclaurin coefficient of a functions belong to this class, are established Faber polynomials are used as a coordinated system to study the geometry of the manifold of coefficients for these functions. Also determining bounds for the first two coefficients of such functions.
In certain cases, our initial estimates improve some of the coefficient bounds and link them to earlier thoughtful results that are published earlier.
The objective of this work is to investigate the performance of a conventional three phase induction motor supplied by unbalanced voltages. An effort to study the motor steady state performance under this disturbance is introduced. Using per phase equivalent circuit analysis with the concept of symmetrical components approach, the steady state performance is theoretically calculated. Also, a model for the induction motor with the MATLAB/Simulink SPS tools has been implemented and steady state results were obtained. Both results are compared and show good correlation as well. The simulation model is introduced to support and enhance electrical engineers with a complete understanding for the steady state performance of a fully loaded induc
... Show MoreAn experimental study was carried out to improve the surface roughness quality of the stainless steel 420 using magnetic abrasive finishing method (MAF). Four independent operation parameters were studied (working gap, coil current, feed rate, and table stroke), and their effects on the MAF process were introduced. A rotating coil electromagnet was designed and implemented to use with plane surfaces. The magnetic abrasive powder used was formed from 33%Fe and 67% Quartz of (250µm mesh size). The lubricant type SAE 20W was used as a binder for the powder contents. Taguchi method was used for designing the experiments and the optimal values of the selected parameters were found. An empirical equation representing the r
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreIn this research, beam expander, BEX, is explained and designed for illuminating the
remote flying target. The BEX is optically designed to be suited for Nd:YAG laser of given
specifications. The BEX is modified to be zoom one to meet the conditions of preventing the
receiving unit; i.e the photodetector, from getting saturated at near and far laser tracking.
Decollimation could be achieved by automatic motor, which controls zoom lens of the BEX
according to the required expansion ratio of beam expander
In every country in the world, there are a number of amputees who have been exposed to some accidents that led to the loss of their upper limbs. The aim of this study is to suggest a system for real-time classification of five classes of shoulder girdle motions for high-level upper limb amputees using a pattern recognition system. In the suggested system, the wavelet transform was utilized for feature extraction, and the extreme learning machine was used as a classifier. The system was tested on four intact-limbed subjects and one amputee, with eight channels involving five electromyography channels and three-axis accelerometer sensor. The study shows that the suggested pattern recognition system has the ability to classify the sho
... Show MoreIn most manufacturing processes, and in spite of statistical control, several process capability indices refer to non conformance of the true mean (µc ) from the target mean ( µT ), and the variation is also high. In this paper, data have been analyzed and studied for a blow molded plastic product (Zahi Bottle) (ZB). WinQSB software was used to facilitate the statistical process control, and process capability analysis and some of capability indices. The relationship between different process capability indices and the true mean of the process were represented, and then with the standard deviation (σ ), of achievement of process capability value that can reduce the standard deviation value and improve production out of theoretical con
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More