This study titled “digital addiction and its relationship to social isolation among children in the autism spectrum from the point of view of their parents” in which the
researcher addressed an important topic which is knowledge of digital addiction in a
child with autism spectrum and its relationship to social isolation in them.
The study aimed to dhed the light on the digital addiction in a spectrum child Autism
from the point of view of their parents، by knowing the extent of addiction of children
in the autism spectrum، and identifying the relationship between electronic addiction and the social isolation of children in the autism spectrum.The study presented
several hypotheses، namely:
Is there digital addiction in children with the autism spectrum from the point of view
of parents?،Is there a social isolation for children with the autism spectrum? And
Is there a correlation between digital addiction and social isolation in children with
autism spectrum? In order to achieve the aims of the study، the researcher used the descriptive approach in the study and relied on the tool of collecting information and
data، which is، the questionnaire that relates to the problem of the study.
The study reached the following main results:
1. From the results of the study، it is clear that there is digital addiction in the child of
the autism spectrum.
2. Among the results of the assumptions that there is social isolation among the child
of the autism spectrum.
3. One of the results of the hypotheses is the presence of a statistically significant
positive correlation between electronic addiction and social isolation in a child with
the autism spectrum
Augmented reality technology is a modern technique used in all fields, including: medicine, engineering and education, and has received attention from officials in the educational process at present; The focus of this research is on the degree of use of augmented reality among field experience students in the project's optimal investment program for teaching staff and their difficulties, applied to a sample of 75 students, through a questionnaire prepared by the researcher as a tool to determine the degree of use, as well as difficulties. The researcher addressed the subject through two main axes to determine the degree of use, as well as the difficulties preventing teachers and learners from using this technique. The results of the rese
... Show MoreThe aim of the research is to shed light on the stages of developing the Iraqi virtual science Library(IVSL) project, and to define its distinctive role in providing all kinds of electronic resources to researchers from professors and graduate students, to identify its contents , the entry interfaces and applications of use, and provide them through electronic portals to publishing houses, research institutions and international universities, The research sample included the teaching staff and researchers participating in educational qualification courses at the Continuing Education Center at the University of Baghdad, The research population and its sample consisted of the category of (IVSL) users, and its sample (387) users. Analysis meth
... Show MoreMonetary policy occupies a prominent role in achieving monetary stability by adjusting the growth rates of the number of available means of payment in line with changes in the size of the gross domestic product in the country and expressed by the monetary stability coefficient agreed upon by the International Monetary Fund, a term that hides the fact that there is a rate of change in the volume of commodity or real production which expresses the levels of aggregate supply in the economy, which corresponds to the quantities of cash in circulation, which represent a net purchasing power and stimulate aggregate demand, which completes the picture of the existence of the market mechanism, expressed by the monetary or economic stability
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreNeed organizations today to move towards strategic thinking which means analyzing situations faced by particular challenges of change in the external environment, which makes it imperative for The Organization That to reconsider their strategies and orientations and operations, a so-called re-engineering to meet those challenges and pressures, to try to achieve improvement root in the installation of the organization and methodscompletion of its work towards achieving high levels of performance and that is reflected to achieve its objectives, and this is what aims to Current search to deal with implications characteristics of strategic thinking in the stages of application re-engineering business of the company General Industries
... Show MoreDue to the developments taking place in the field of communications, informatics systems and knowledge management in the current century, and the obligations and burdens imposed on the business organization to keep pace with these developments, the traditional methods of administrative decision-making are no longer feasible, as recent trends have emerged in management that focus on the need to rely on quantitative methods such as operations research.. The latter is one of the results of World War II, which appeared for the first time in Britain to manage war operations. The first method used in this field is the linear programming method. The use of operations research has developed greatly in the past years, and the methods of analysis in
... Show MoreMany literary research papers have dealt with the work of Margaret Atwood's The Handmaid's Tale (1985) as a feminist work. However, nearly few studies combine social oppression with religious extremism. To bridge this gap, the present study aims at exploring the use of totalitarian theocracy of terror to oppress its citizens in the name of religion. In other words, it explicates the way religion is used to brutally suppress and exploit people in general and vulnerable women in particular. To meet this objective, the study adopted the qualitative descriptive method to describe how religion is used as a contradictory controlling means in Gilead discourse. It also adopted the Foucault theory in analyzing the data of the study, illu
... Show MoreAbstract
This research aims to measure the effect of Self competency of the Managers in their behavior from the view point of the working individual in the organization since the behavior of managers is considered to be one of the essential variables in the organization which can affect the performance and the commitment of the working individual. the questioners was used to gather the data and the Iraqi Rail Road co. was the field of the study . and a random sample of (36) individual of the subordinates of the managers society of the study and used the (SPSS) statistical program was used in the analysis of the data of the research . the findings refer to the existence of a
... Show MoreThe research deals with an important issue that many people are working on, namely the sanctification of the texts on which the timings of the time and the different conditions of the place took place. Do not live up to the ranks of perfection and perfection, and every effort has explanations according to the mind machine, which is not protected by infallibility from error. The great downfall is to put these intellectual efforts in the Bible without separating them from the Word of God. The situation and the place on the adherents of a religion and mixed with the trick of the average individual only to be subject to the words of the teachers of Sharia and docility.
We are, today, facing a torrent of information, ideas, images and videos due to advances of communication technology and electronic publishing. In addition to the proliferation of social networking sites that allow individuals to use them and participate in their channels without any restrictions limiting their freedom in publishing. Due to these sites many terms have emerged like alternative media which use internet and its various techniques to serve its objectives notably the freedom of expression without restrictions. This research studies the phenomenon of interactive media i.e. alternative media through Facebook along with the freedom that makes it spreading in the society and the relation of individual freedom with social diversit
... Show More