Preferred Language
Articles
/
jperc-731
A study and Evaluation of some of the variables in the Stubborn Child behavior in eating his food Between the ages of 3 to 6 years
...Show More Authors

The child realize that the meals time provide golden opportunities to get the attention the child needs. However, many difficulties that may appear about eating food can be avoided, if the family used the right way in dealing with this problem. The study aims, in this case, at searching for the reasons that lies behind the child's obstinacy in eating his food and the attempt to study some variables that is related to the research topic.

The results are summed up as follows:

 

  • The number of the sample children is 3 of both sexes between the ages of 3 to 6 years.
  • The scientific level of the mothers: the highest ratio 80% has the secondary school and the lowest ratios 20% are from different levels the mothers are either have BH degree 90% or MA degree 10%.
  • The patterns the families use to present to the child in cooking are boiled food, fried food, and fresh food.
  • The methods used to convince the child is watching TV 70%, giving encouragements to the child 15%, 10% comparing the child with other children,5% the use of punishment, the effect of the brothers and parents 50%, the effect of the friends' children 50%.

 

Macnmar and Cosheran test is used as indicator of the statistic analysis to the results which reached Macnmar factor of the effect of the child's participation during eating food 22.3% and the effect of the number of times the child participates in making food value is 17.9%. and the value of the change of nutritious behavior of the child when the food is varied is 16.9. A11 the previous values are higher in the beginning that means it is of statistical significance in effecting these variables which equals three time the stubborn child's behavior to be positive. While when the equation applied as indicators to know the effect of the parents in the child's behavior, and the use of encouragement and punishment the value reached the static value 803.85. And this value is higher than the tabled value which is 9.31 and this gives meaning that the results are of statistic significance at the level 0.01.

Consequently it is discovered that eating by force leads at the end to indigestion and the food will not be absorbed in a normal way. The success in the nutrition process needs patience and wide heart from the side of the parents, because may be the family might guide the child behavior in a direct and the right way and teach him what he needs and train him/her the right behavior. The methods of raising the children and guide them to what is good and avoid and fearing what is evil or what bother or irritate them is the style of the Islamic education and the nature Allah ( be praised) created man on to love of the good, heavenly, prosperity, and survival.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers
...Show More Authors

      Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the  most effective parameter, particularly when Age<49.5. Whereas  Ki67  appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu

... Show More
Scopus (14)
Crossref (9)
Scopus Crossref
Publication Date
Sat Mar 01 2025
Journal Name
Iranian Journal Of Nursing And Midwifery Research
Girls’ Self-Esteem and its Association with Self-Stigma toward Obesity
...Show More Authors
Abstract<sec> <title>Background:

Obesity among girls can lead to physical, psychological, or social problems. Enhancing self-esteem and reducing self-stigma toward obesity can play a crucial role in girls’ health. This study aims to assess girls’ self-esteem and its association with self-stigma toward obesity.

Materials and Methods:

A descriptive cross-sectional design was used to meet the study’s objective. A convenience sampling method was used to gather the sample from 24 middle and high schools in five cities across Iraq from (January

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
China's Soft Power and Diplomacy towards Middle East Region after 2011
...Show More Authors

The study deals with China's soft power and diplomacy in the Middle East, and it focuses specifically on the tools and foundations of China's soft diplomacy and how it achieves its goals in the region in addition to its challenges in the region. In this regard, the study also focuses on the Chinese Belt and Road Initiative and its soft foundations and how they serve China’s diplomacy and soft power in the region. The study ends with a set of conclusions, perhaps the most prominent of which is that diplomacy and soft power have become a fundamental pillar of China's foreign policy to achieve its foreign goals and to establish an international system compatible with China's principles. As for the Middle East, China has established a poli

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 06 2023
Journal Name
Journal Of Economics And Administrative Sciences
Probit and Improved Probit Transform-Based Kernel Estimator for Copula Density
...Show More Authors

Copula modeling is widely used in modern statistics. The boundary bias problem is one of the problems faced when estimating by nonparametric methods, as kernel estimators are the most common in nonparametric estimation. In this paper, the copula density function was estimated using the probit transformation nonparametric method in order to get rid of the boundary bias problem that the kernel estimators suffer from. Using simulation for three nonparametric methods to estimate the copula density function and we proposed a new method that is better than the rest of the methods by five types of copulas with different sample sizes and different levels of correlation between the copula variables and the different parameters for the function. The

... Show More
Publication Date
Sun Jul 01 2018
Journal Name
2018 2nd International Conference On Imaging, Signal Processing And Communication (icispc)
Analogy-based Common-Sense Knowledge for Opinion-Target Identification and Aggregation
...Show More Authors

The development of Web 2.0 has improved people's ability to share their opinions. These opinions serve as an important piece of knowledge for other reviewers. To figure out what the opinions is all about, an automatic system of analysis is needed. Aspect-based sentiment analysis is the most important research topic conducted to extract reviewers-opinions about certain attribute, for instance opinion-target (aspect). In aspect-based tasks, the identification of the implicit aspect such as aspects implicitly implied in a review, is the most challenging task to accomplish. However, this paper strives to identify the implicit aspects based on hierarchical algorithm incorporated with common-sense knowledge by means of dimensionality reduction.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Medium access control protocol design for wireless communications and networks review
...Show More Authors

<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe

... Show More
Crossref (4)
Crossref
Publication Date
Mon Dec 04 2023
Journal Name
Aip Conf. Proc
Double LA-transform and their properties for solving partial differential equations
...Show More Authors

Scopus (7)
Scopus