The childhood stage is considered the most important stage of all the stages through
the human being’s life. In this stage the human being will be more affected by the various
factors that surround him/her. The first five years of his/her life leave a great impact not only
on the human being personality, but also on his/her whole life. Therefore, it is worthwhile tobe concerned with and focus at the raising up and the teaching of the child during the
childhood stage.
The mission of raising up children in this era - the era of globalization and information
bursting or news flooding – has become a very difficult or even an impossible mission.
Furthermore, not only in the Arabic world, but also all over the world, this era has become a
depressing and a disappointing era to many serious parents and teachers, who seek the fact
and care about both their children’s benefit and the benefit of those who raise them up.
Children are seen to be more accepting to and more connecting with the building up of
civilization. The parent’s attentiveness and the level of their educational maturity will define
the level of family evolution and its role in affecting the child’s personality.
Eventually, all these matters go back to the shortage in the environmental attentiveness
and its relation to the health of the human beings. All these leads to the problem discussed in
this research which is the revealing of the attentiveness by the problem of technological media
poisoning of the children’s parents and their teachers.
The aim of this research is to be acquainted with:
The attentiveness of the technological media poisoning in the members of the sample.
The attentiveness of the technological media poisoning in the kindergarten teachers.
The differences in the attentiveness of the technological media poisoning.
between the kindergarten children’s parents and the children’s teacher.
This research is limited the children’s parents and teachers of the kindergartens in
Baghdad for the academic year 2012-2013.
In order to achieve the goal of this research, the researcher has performed a scale of the
attentiveness of the technological media poisoning according to the scientific steps in the
construction of the psychological scales.
To approve the truth of the scale to be introduced to a number of experts. After
straightening some of the scale items, (33) the of the scale has been approved.
Moreover, the researcher uses statistical analysis for the items by calculating the
distinctive power, which proves that all the items of the scale are distinctive and statistically
significant. The researcher tries to find out the relation between the degree of the item and the
total degree.
The validity of the scale has been approved by repeating the test. The validity factor is
(0.86), which proves that the validity factor is reliable. In the application of the Falkronbach
formula, it has been found that the validity factor is (0.93). This proves that the validity factor
is reliable.
The scale has been applied on (600) members of the sample, whichcontains randomly
chosen children’s parents and kindergarten teachers.
The result of the research are as follows:
All the members of the sample have attentiveness of the technological media poisoning.
The children’s parents have attentiveness of the technological media poisoning.
The kindergarten teachers have attentiveness of the technological media poisoning.
There are differences in attentiveness between all the members of the sample to the
benefit of the mothers side.
The researcher has introduced a number of recommendations and suggestions, which
are going to be discussed later.
In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreThe majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution
... Show MoreThis study aimed to find out the impact of work-life balance on employee satisfaction in five-star hotels in Amman, Jordan based on a descriptive analytical approach. The questionnaire of the survey was designed and distributed to a sample of participants in order to collect the necessary data for this study and they were analyzed later through the SPSS V22 program. The study population was the hotel sector in Jordan, while the study sample included the five-star hotels in the capital, Amman, and the sampling unit included the employees of the middle and lower levels of management in the five-star hotels in Amman. The study showed a number of results, including the existence of a good level of work-life balance by employees in top manage-me
... Show MoreAbstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreIR, MIR, UV – Visible spectra have been studied for Cobalt chloride molecule (CoCl2. 6H2O) compound, In wide range spectra (40000 – 410) cm-1 specially MIR range. Assignment were achieved for the fundamental vibrational bands of (CoCl2 . 6H2O ) to symmetry stretching ?1 (?^+) Anti – symmetry stretching ?3(?^+), these bands are non-degenerate , and the bending band is ?2(?) is doubly degenerate thought they have activity in IR and Raman , which explain the weakness in symmetry of this molecule, the fundamental bands for the molecule are centered at the following wave numbers (615, 685, 795, 1115, 1340, 1375, 1616.35, 2091, 2386, 2410, 3364) cm-1 which are corresponding to wave lengths (16260, 14598, 12578, 8968, 7462, 7272, 6186,
... Show More