The childhood stage is considered the most important stage of all the stages through
the human being’s life. In this stage the human being will be more affected by the various
factors that surround him/her. The first five years of his/her life leave a great impact not only
on the human being personality, but also on his/her whole life. Therefore, it is worthwhile tobe concerned with and focus at the raising up and the teaching of the child during the
childhood stage.
The mission of raising up children in this era - the era of globalization and information
bursting or news flooding – has become a very difficult or even an impossible mission.
Furthermore, not only in the Arabic world, but also all over the world, this era has become a
depressing and a disappointing era to many serious parents and teachers, who seek the fact
and care about both their children’s benefit and the benefit of those who raise them up.
Children are seen to be more accepting to and more connecting with the building up of
civilization. The parent’s attentiveness and the level of their educational maturity will define
the level of family evolution and its role in affecting the child’s personality.
Eventually, all these matters go back to the shortage in the environmental attentiveness
and its relation to the health of the human beings. All these leads to the problem discussed in
this research which is the revealing of the attentiveness by the problem of technological media
poisoning of the children’s parents and their teachers.
The aim of this research is to be acquainted with:
The attentiveness of the technological media poisoning in the members of the sample.
The attentiveness of the technological media poisoning in the kindergarten teachers.
The differences in the attentiveness of the technological media poisoning.
between the kindergarten children’s parents and the children’s teacher.
This research is limited the children’s parents and teachers of the kindergartens in
Baghdad for the academic year 2012-2013.
In order to achieve the goal of this research, the researcher has performed a scale of the
attentiveness of the technological media poisoning according to the scientific steps in the
construction of the psychological scales.
To approve the truth of the scale to be introduced to a number of experts. After
straightening some of the scale items, (33) the of the scale has been approved.
Moreover, the researcher uses statistical analysis for the items by calculating the
distinctive power, which proves that all the items of the scale are distinctive and statistically
significant. The researcher tries to find out the relation between the degree of the item and the
total degree.
The validity of the scale has been approved by repeating the test. The validity factor is
(0.86), which proves that the validity factor is reliable. In the application of the Falkronbach
formula, it has been found that the validity factor is (0.93). This proves that the validity factor
is reliable.
The scale has been applied on (600) members of the sample, whichcontains randomly
chosen children’s parents and kindergarten teachers.
The result of the research are as follows:
All the members of the sample have attentiveness of the technological media poisoning.
The children’s parents have attentiveness of the technological media poisoning.
The kindergarten teachers have attentiveness of the technological media poisoning.
There are differences in attentiveness between all the members of the sample to the
benefit of the mothers side.
The researcher has introduced a number of recommendations and suggestions, which
are going to be discussed later.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreLeft ventricular hypertrophy (LVH) caused by high blood pressure is linked to increased mortality and arrhythmia risk. This study aimed to evaluate arrhythmia in hypertensive patients due to left ventricular hypertrophy (LVH). A cross-sectional study was performed, assessing participants' blood pressure, echocardiography and electrocardiography, and Holter monitoring in certain cases. There were 300 hypertensive patients >18 years attending the cardiology unit of Baghdad medical city. The study was conducted between January–June 2022. The electrocardiograms at rest for 300 adults with hypertension were investigated. 130 (43.5%) were females, and 170 (56.5%) were males. The mean age of participants was 58 years. Forty-nine (16.3
... Show MoreBackground: Myocardial infarction (MI) is distinguished by the necrosis of myocardial cells as a result of substantial and prolonged ischemia. Anxiety, problems sleeping, and feelings of depression are some of the most common psychosocial consequences of having a myocardial infarction. Aim: The purpose of this study is to evaluate the effects of post-myocardial infarction on patients' levels of anxiety, depression, and quality of sleep. Method: The collection of data from 94 individuals with MI was carried out according to a descriptive cross-sectional design. Sleep quality, depression, and anxiety were evaluated using standard questionnaires. Results: 69.1% of the participants reported having trouble getting quality sleep. The perc
... Show MoreAbstract
This research aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that
... Show MoreIt is recognized that organisms live and interact in groups, exposing them to various elements like disease, fear, hunting cooperation, and others. As a result, in this paper, we adopted the construction of a mathematical model that describes the interaction of the prey with the predator when there is an infectious disease, as well as the predator community's characteristic of cooperation in hunting, which generates great fear in the prey community. Furthermore, the presence of an incubation period for the disease provides a delay in disease transmission from diseased predators to healthy predators. This research aims to examine the proposed mathematical model's solution behavior to better understand these elements' impact on an eco-epidemi
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreIncorporating waste byproducts into concrete is an innovative and promising way to minimize the environmental impact of waste material while maintaining and/or improving concrete’s mechanical characteristics and strength. The proper application of sawdust as a pozzolan in the building industry remains a significant challenge. Consequently, this study conducted an experimental evaluation of sawdust as a fill material. In particular, sawdust as a fine aggregate in concrete offers a realistic structural and economical possibility for the construction of lightweight structural systems. Failure under four-point loads was investigated for six concrete-filled steel tube (CFST) specimens. The results indicated that recycled lightweight co
... Show More