Preferred Language
Articles
/
jperc-507
The educational violence and it's reflections on study attainment of the primary stage pupils
...Show More Authors

Chapter-1

Problem of the research: 

The studies and researches have noticed the aggravation of violence practice in all educational means using different and innovated styles against children in the school and house in order to upbringing by the parents or the school .

It is a training method for the person to participate in the society and prepare him to be an effective member.

The current research confines the children in age (6-12) years old representing the primary stage who face different kind of violence during the familiar or school education.

The current research aims to:

1 – The kinds of violence which happens to the children in the primary stage in both familiar and school kinds .

2- The value of educational violence reflections on study attainment .

Violence is defined as every action causes a hurt (moral, material, phonetic, bodily) practice individually or collective then put the child in confrontation with an act (the purpose from it is violence) .

Chapter-2

Kinds of violence:

Kinds and forms of violence can be briefed into:

1 – According to its nature is divided to:

a – Innate violence .

b – Acquired violence .

2 - According to the type of violence is divided into:

a – Material violence .

b – Moral violence .

3 – According to the pointed side is divided to:

a –Against the others violence .

b- Self violence .

4 – According to the legality of violence is divided to:

a –Official violence .

b- unofficial violence .

5 – According to the reason:

a –Attacking violence .

b- Defending violence .

6 – According to the actor:

a –Individual violence .

b- Collective violence .

Theories of violence:

The important theories which tried to explain the violent behavior are :

a – The classical psychological theory .

b – The modern psychological theory .

Former studies:

 Gibb study (1983).۩

Cooper & Mackie study (1986). ۩

Chapter-3

After discussing the violence theories they reached to adopt the theory of (Pandora), because it is the nearest theory in explaining the violence phenomenon, and it is portrayed in universality and assert the role of parents and friends and playing group and media in developing, the violence phenomenon  , and concerned in studying human and interaction with others .

Chapter-4

The researcher concluded:

That the imposed violence in communication means led to aggressive behavior respond, and the vocal and body violence causes harm, hurt, pain to oneself, loneliness, and disappointment.

The researcher recommended:

Public awareness and introduce instruction, and curative programs explaining the danger of violence and the means to cure avoid it. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Water Resource And Protection
Seasonal Variations of Some Ecological Parameters in Tigris River Water at Baghdad Region, Iraq
...Show More Authors

View Publication
Crossref (30)
Crossref
Publication Date
Wed Nov 12 2014
Journal Name
Wireless Personal Communications
A Multi-objective Disjoint Set Covers for Reliable Lifetime Maximization of Wireless Sensor Networks
...Show More Authors

View Publication
Scopus (19)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Thu Feb 25 2021
Journal Name
Iraqi Journal Of Agricultural Sciences
OPTIMIZATION OF LEVOFLOXACIN REMOVAL FROM AQUEOUS SOLUTION USING ELECTROCOAGULATION PROCESS BY RESPONSE SURFACE METHODOLOGY
...Show More Authors

This study was aimed to investigate the response surface methodology (RSM) to evaluate the effects of various experimental conditions on the removal of levofloxacin (LVX) from the aqueous solution by means of electrocoagulation (EC) technique with stainless steel electrodes. The EC process was achieved successfully with the efficiency of LVX removal of 90%. The results obtained from the regression analysis, showed that the data of experiential are better fitted to the polynomial model of second-order with the predicted correlation coefficient (pred. R2) of 0.723, adjusted correlation coefficient (Adj. R2) of 0.907 and correlation coefficient values (R2) of 0.952. This shows that the predicted models and experimental values are in go

... Show More
Crossref (15)
Crossref
Publication Date
Wed Feb 12 2014
Journal Name
In Vitro Cellular & Developmental Biology - Plant
Overexpression of a tobacco osmotin gene in carrot (Daucus carota L.) enhances drought tolerance
...Show More Authors

Osmotin and osmotin-like proteins belong to the PR-5 pathogenesis-related group of proteins and are induced in response to various types of biotic and abiotic stresses in several plant species. Carrot was transformed with a tobacco osmotin gene that encodes a protein lacking the vacuolar-sorting motif that is composed of a 20-amino-acid sequence at the C-terminal end, under the control of the cauliflower mosaic virus 35S promoter, using Agrobacterium-mediated transformation. Transgene integration and expression were confirmed by Southern and western blot analyses, and three selected transgenic lines were evaluated for their ability to tolerate drought stress. Under drought stress conditions, all transformants exhibited slower rates of wilti

... Show More
View Publication
Scopus (21)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
Iop Conference Series: Materials Science And Engineering
Evaluation of Electromagnetic Near-Field Measurement Technique as Non-Destructive Testing for Composite Structures
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Preparation of Light Fuel Fractions from Heavy Vacuum Gas Oil by Thermal Cracking Reaction
...Show More Authors

This work deals with thermal cracking of heavy vacuum gas oil which produced from the top of vacuum distillation unit at Al- DURA refinery, by continuous process. An experimental laboratory plant scale was constructed in laboratories of chemical engineering department, Al-Nahrain University and Baghdad University. The thermal cracking process was carried out at temperature ranges between 460-560oC and atmospheric pressure with liquid hourly space velocity (LHSV) equal to 15hr-1.The liquid product from thermal cracking unit was distilled by atmospheric distillation device according to ASTM D-86 in order to achieve two fractions, below 220oC as a gasoline fraction and above 220oC as light cycle o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Petroleum Science And Engineering
Performance evaluation of analytical methods in linear flow data for hydraulically-fractured gas wells
...Show More Authors

View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Mar 26 2022
Journal Name
Neuroquantology
Efficiency Evaluation of Optical System Includes Different Stop Apertures When Using Relative Moving Factor
...Show More Authors

In this work, optical system with different aperture shapes (circular, square, elliptical and triangle aperture) has been used for efficiency evaluation when the system involved moving factor in ideal case (aberration free). The optical system evaluate far moving object, therefore the image forming at image plane due to point spread function (image formula of incoherently illuminated point object). A mathematical treatment has been used to getting results by Gaussian numerical calculations method. The results show priority of circular aperture when optical system that submits of moving factor.

View Publication
Crossref (2)
Crossref
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Use of Gis for Creating a Project Management Data Base in Baghdad Al-Rissfa
...Show More Authors

The main objective of resources management is to supply and support the site operation with necessary resources in a way to achieve the required timing in handing over the work as well as to achieve the cost-realism within the budget estimated. The research aims to know the advantage of using GIS in management of resources as one of the new tools that keep pace with the evolution in various countries around the world also collect the vast amount of spatial data resources in one environment easily to handled and accessed quickly and this help to make the right decision regarding management of resources in various construction projects. The process of using GIS in the management and identification of resources is of extreme importance in t

... Show More
View Publication Preview PDF
Crossref