Objective(s): To assess the practices of early childhood’s mothers regarding toilet training and to find out the relationship between mothers’ practices and their socio-demographic characteristics and their children’s demographic characteristics.
Methodology: A descriptive study is conducted at primary health care centers in Al-Rusafa District in Baghdad City for the period of September 19th 2020 to March 16th 2021. Non probability “convenient” sample of (225) early childhood’s mothers is selected. A questionnaire format is designed and composed of two parts: the first part includes mothers’ socio-demographic characteristics and their children and the second part includes structured close-ended questions to assess the practices of the early childhood’s mothers regarding toilet training. The reliability of the questionnaire is determined through a pilot study and the content validity is obtained through a panel of (15) experts. The data are collected through the use of the questionnaire and analyzed through the use of the descriptive and inferential statistical data analysis approaches.
Results: The study findings indicate that mothers’ practices are moderate toward toilet training and there are significant relationship between mothers’ practices and their socio-demographic characteristics of their education and marital status.
Recommendations: Extensive health education program should be applied by the Ministry of Health and Environment to enhance and develop early childhood’s mother practices regarding toilet training. Such program can be delivered through mass media, posters, booklets, and primary health care centers staff.
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreL-Phenylalanine amino acid was condensed with 2-hydroxybezaldehyde to give the Schiff base sodium 2-(2-hydroxybenzylideneamino)-3-phenylpropanoate, which was used as a precursor [NaHL]. The precursor was reacted with 1,2-dichloroethane to give the Schiff base sodium 2,2'-(2,2'-(ethane-1,2diylbis(oxy))bis(2,1-phenylene))bis(methan-1-yl-1-ylidene)bis(azan1-yl-1-ylidene)bis(3-phenyl propanoate), which was used as a ligand [Na2L], in complexation with some metal (II) chloride MCl2, where [M= Co(II), Ni(II), Cu(II) and Zn(II)], to give [M(L)] complexes. The [Na2L] ligand and All complexes were characterized by spectroscopic methods, [FTIR, UV-Vis, atomic absorption], melting point, chloride content, conductivity and magnetic susceptibi
... Show MoreThe research includes the synthesis and identification of the mixed ligands complexes of M(II) Ions in general composition [M(Lyn)2(phen)] Where L- lysine (C6H14N2O2) commonly abbreviated (LynH) as a primary ligand and 1,10-phenanthroline(C12H8N2) commonly abbreviated as "phen," as a secondary ligand . The ligands and the metal chlorides were brought in to reaction at room temperature in ethanol as solvent. The reaction required the following molar ratio [(1:1:2) (metal): phen:2 Lyn -] with M(II) ions, were M = Mn(II),Cu(II), Ni(II), Co(II), Fe(II) and Cd(II). Our research also includes studying the bio–activity of the some complexes prepared against pathogenic bacteria Escherichia coli(-),Staphylococcus(-) , Pseudomonas (-), Bacillus (-)
... Show MoreNew Schiff base ligand 2-((4-amino-5-(3, 4, 5-trimethoxybenzyl) pyrimidin- 2-ylimino) (phenyl)methyl)benzoic acid] = [HL] was synthesized using microwave irradiation trimethoprim and 2-benzoyl benzoic acid. Mixed ligand complexes of Mn((ІІ), Co(ІІ), Ni(ІІ), Cu(ІІ), Zn(ІІ) and Cd(ІІ) are reacted in ethanol with Schiff base ligand [HL] and 8-hydroxyquinoline [HQ] then reacted with metal salts in ethanol as a solvent in (1:1:1) ratio. The ligand [HL] is characterized by FTIR, UV-Vis, melting point, elemental microanalysis (C.H.N), 1H-NMR, 13C-NMR, and mass spectra. The mixed ligand complexes are characterized by infrared spectra, electronic spectra, (C.H.N), melting point, atomic absorption, molar conductance and magnetic moment me
... Show MoreIn this study, different methods were used for estimating location parameter and scale parameter for extreme value distribution, such as maximum likelihood estimation (MLE) , method of moment estimation (ME),and approximation estimators based on percentiles which is called white method in estimation, as the extreme value distribution is one of exponential distributions. Least squares estimation (OLS) was used, weighted least squares estimation (WLS), ridge regression estimation (Rig), and adjusted ridge regression estimation (ARig) were used. Two parameters for expected value to the percentile as estimation for distribution f
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More
ملخص البحث:
ان الله تعالى هو الذي خلق جميع المخلوقات ، والذي بيده الموت والحياة وان كل هذه المخلوقات تحتاج الى اوامر ، وهذه الاوامر الالهية وجهها الله لعبادة بوساطة انبياءه ( عليهم السلام) فكانوا هم اول المستسلمين والمنقادين لأوامره ، فجاءت الآيات الكريمة مخاطبة للأنبياء واقوامهم بشكل عام ولنبينا محمد (r) بشكل خاص.
اما عن المضمون البحثي فقد جاءت مادته مقسمة الى ثل
... Show MoreConsidering the magnitude of its economic, social and political impact, unemployment represents a crucial challenge confronting the majority of the countries of the world. The problem of the study was the high rates of unemployment in Sudan and the inability of economic growth rates to keep pace with the steady increases in unemployment rates during the study period. This study aimed to identify the economic and social variables influencing unemployment rate in Sudan, in addition to measuring the impact of these variables over the period (1981-2015). Data were collected from databases of the World Bank and Atlas of the World's data .The study hypothesized the presence of statistically significant and direct relationship between u
... Show More