The childhood stage is considered the most important stage of all the stages through
the human being’s life. In this stage the human being will be more affected by the various
factors that surround him/her. The first five years of his/her life leave a great impact not only
on the human being personality, but also on his/her whole life. Therefore, it is worthwhile tobe concerned with and focus at the raising up and the teaching of the child during the
childhood stage.
The mission of raising up children in this era - the era of globalization and information
bursting or news flooding – has become a very difficult or even an impossible mission.
Furthermore, not only in the Arabic world, but also all over the world, this era has become a
depressing and a disappointing era to many serious parents and teachers, who seek the fact
and care about both their children’s benefit and the benefit of those who raise them up.
Children are seen to be more accepting to and more connecting with the building up of
civilization. The parent’s attentiveness and the level of their educational maturity will define
the level of family evolution and its role in affecting the child’s personality.
Eventually, all these matters go back to the shortage in the environmental attentiveness
and its relation to the health of the human beings. All these leads to the problem discussed in
this research which is the revealing of the attentiveness by the problem of technological media
poisoning of the children’s parents and their teachers.
The aim of this research is to be acquainted with:
The attentiveness of the technological media poisoning in the members of the sample.
The attentiveness of the technological media poisoning in the kindergarten teachers.
The differences in the attentiveness of the technological media poisoning.
between the kindergarten children’s parents and the children’s teacher.
This research is limited the children’s parents and teachers of the kindergartens in
Baghdad for the academic year 2012-2013.
In order to achieve the goal of this research, the researcher has performed a scale of the
attentiveness of the technological media poisoning according to the scientific steps in the
construction of the psychological scales.
To approve the truth of the scale to be introduced to a number of experts. After
straightening some of the scale items, (33) the of the scale has been approved.
Moreover, the researcher uses statistical analysis for the items by calculating the
distinctive power, which proves that all the items of the scale are distinctive and statistically
significant. The researcher tries to find out the relation between the degree of the item and the
total degree.
The validity of the scale has been approved by repeating the test. The validity factor is
(0.86), which proves that the validity factor is reliable. In the application of the Falkronbach
formula, it has been found that the validity factor is (0.93). This proves that the validity factor
is reliable.
The scale has been applied on (600) members of the sample, whichcontains randomly
chosen children’s parents and kindergarten teachers.
The result of the research are as follows:
All the members of the sample have attentiveness of the technological media poisoning.
The children’s parents have attentiveness of the technological media poisoning.
The kindergarten teachers have attentiveness of the technological media poisoning.
There are differences in attentiveness between all the members of the sample to the
benefit of the mothers side.
The researcher has introduced a number of recommendations and suggestions, which
are going to be discussed later.
DBN Dr. Liqaa Habeb, International Journal of Multidisciplinary Reseach, 2015
Recently Tobit Quantile Regression(TQR) has emerged as an important tool in statistical analysis . in order to improve the parameter estimation in (TQR) we proposed Bayesian hierarchical model with double adaptive elastic net technique and Bayesian hierarchical model with adaptive ridge regression technique .
in double adaptive elastic net technique we assume different penalization parameters for penalization different regression coefficients in both parameters λ1and λ2 , also in adaptive ridge regression technique we assume different penalization parameters for penalization different regression coefficients i
... Show MoreThe theory of general topology view for continuous mappings is general version and is applied for topological graph theory. Separation axioms can be regard as tools for distinguishing objects in information systems. Rough theory is one of map the topology to uncertainty. The aim of this work is to presented graph, continuity, separation properties and rough set to put a new approaches for uncertainty. For the introduce of various levels of approximations, we introduce several levels of continuity and separation axioms on graphs in Gm-closure approximation spaces.
Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreThe problematic of the current research marked (style between alienation and westernization in contemporary painting) is demonstrated by the fact that the stylistic forms in art are full of the influx of subjective and emotional impressions, as well as administrative and borrowing techniques, as well as their contextual meaning, whether cultural, social and political, which gives them an alien dimension at one time or another. The aim of the research is: Define the style between alienation and alienwesternization in contemporary painting. The research included six axes dealing with the first axis: an introduction to the concept of alienation, and the second axis dealing with the style in romanticism. The third dealt with: the method in i
... Show MoreBackground: One of the more significant hormonal systems, the renin-angiotensin-aldosterone system, controls the kidney function, adrenal gland through its effect on the balance of sodium and potassium, blood pressure, fluid volume, and also manages the functions of cardiovascular. Objective: To clarify the interrelationship between renal dysfunction and renin-angiotensin-aldosterone system. Patients and Methods: One hundred samples were collected from December 1, 2022, to February 18, 2023, from Al Shams Medical Laboratories (56 male, and 44) female, age range (of 45-60 years), all of them were volunteers suffering from chronic renal failure in the third stage the average glomerular filtration rate was 35. 70 ± 0.37 12
... Show MoreThe petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More