Abstract:
The aim of the present research is to evaluate the child’s nutritional
method (2-5 years old) which is based on his resistance of the food highly rich
with nutritional elements and his acceptance of the food of a low nutritional
value in addition to his having forbidden food with other mates and making
use of all mates when having food, in establishing the sound social values and
affection since child hood. The required statistical equation have been used
by the researcher namely (Z test).
The sample of the present study consists of (26) children who were selected
intentionally and randomly from the kindergartens of Al-Bayaa region and the
college of Education for women. The questionnaires were distributed among
the samples mother. After sorting the answers, it was noticed that the foods
refused by the child included : milk, eggs, meat, fish, rice, potatoes, soup,
bread, eggplants, green pepper, cucumber, tomatoes, banana and orange.
The reasons behind the children’s refusal mediated between the highest
percentage (100%) for the children who had no desire and the lowest
percentage (20%) for fear of the shape of food as a fish for not having such
types of food by the cartoon films, while the other percentages (30-80%)
oscillated for the food taste, lack of appetite, inability to crew, food smell,
creating accuses, the child’s health but when the child was brought together
with his mates, he was able to have the same rejected food in a high degree.
The results of the study concluded that the increase of the child’s acceptance
of the food leads to some positive indicators among which achieving the
sound social, educational and nutritional aims especially under the
circumstances our country lives in and this is the first step towards
establishing the national values for the children of the neighborhood and the
kinder gather friends away from any wrong concept that might dissociate
them.
The ground state proton, neutron and matter densities andcorresponding root mean square radii of unstable proton-rich 17Neand 27P exotic nuclei are studied via the framework of the twofrequencyshell model. The single particle harmonic oscillator wavefunctions are used in this model with two different oscillator sizeparameters core b and halo , b the former for the core (inner) orbitswhereas the latter for the halo (outer) orbits. Shell model calculationsfor core nucleons and for outer (halo) nucleons in exotic nuclei areperformed individually via the computer code OXBASH. Halostructure of 17Ne and 27P nuclei is confirmed. It is found that thestructure of 17Ne and 27P nuclei have 25 / 2 (1d ) and 1/ 2 2s -dominantconfigurations, resp
... Show MoreIn this paper, we introduced module that satisfying strongly -condition modules and strongly -type modules as generalizations of t-extending. A module is said strongly -condition if for every submodule of has a complement which is fully invariant direct summand. A module is said to be strongly -type modules if every t-closed submodule has a complement which is a fully invariant direct summand. Many characterizations for modules with strongly -condition for strongly -type module are given. Also many connections between these types of module and some related types of modules are investigated.
This research is mainly about the Arabic poetical work of the poet “Fadhuli AL-Baghdadi ». It aims to show the poetic purposes used like (advice, flirting and praise). This research sheds some lights on how the poetical work was hardly found because it has only one copy, which is originally a transcript
This study analyses AL-Baghdadi's poems, as well as Sheding some lights on earlier life and his other compositions, AL-Baghdadi is considered a tri-lingual poet who wrote in Turkish, Arabic and persian. His Surname as "AL- Baghdadin was as mentioned by some historians, due to his being born in Baghdad or to All a resident in Baghdad at that some poets, who wrote in Arabic have been mentioned here also, like The judge Burhan Al-
... Show MoreThis article investigates the relationship between foot angle and jump stability, focusing on minimizing injury risk. Here are the key points: Importance: Understanding foot angle is crucial for improving jump stability, athletic performance, and reducing jump-related injuries like ankle sprains. Ideal Foot Angle: Research suggests a forward foot angle of around 15 degrees might be ideal for many people during jumps. This angle distributes forces evenly across the foot, lowers the center of gravity, and provides more surface area for pushing off the ground. Factors Affecting Ideal Angle: The optimal angle can vary depending on the type of jump (vertical vs. long jump), fitness level, and personal preference. Incorrect Foot Angles: Landing w
... Show MoreBackground: This study aims to determine whether cigarette smoking and anxiety degrees are related among nurses. Methods: A correlation design study was conducted at Baquba Teaching Hospital in Diyala Governorate, and the study period extended from September 10th, 2023, to January 28th, 2024. A nonprobability purposive sample was used to include 200 nurses working at Baquba Teaching Hospital, Iraq. Data were collected using a self-administered questionnaire from January 10th to February 7th, 2024. There were two components to the study instruments. Initially, the demographic sheet contained the individuals' sociodemographic data. The Taylor manifest anxiety scale is included in the second section. The collected data were analyzed us
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreA good performance of reinforced concrete structures is ensured by the bond between steel and concrete, which makes the materials work together, forming a part of solidarity. The behavior of the bond between the reinforcing bar and the surrounding concrete is significant to evaluate the cracking control in serviceability limit state and load capacity in the ultimate limit state. In this investigation, the bond stresses between reinforcing bar and reactive powder concrete (RPC) was considered to compare it with that of normal strength concrete (NSC). The push-out test with short embedment length is considered in this study to evaluate the bond strength, bond stress-slip relationship, and bond stress-crack width relationsh
... Show MoreBackground: Cystatin C is recently considered to be a good predictor of cardiovascular morbidity and mortality in patients with coronary artery disease (CAD)Objectives: Correlation between cystatin and ischemic heart disease.Methods :One hundred forty patients (140) with ischemic heart disease admitted to thin study at Baghdad teaching hospital from the period June. 2011 to Jan. 2012. Those patients was categorized into three groups.Group (A): patients with ischemic heart failure.Group (B): Patients with myocardial infarction.Group (C) patients with unstable angina.All these groups were in comparison to fifty (50) healthy controls. Fasting serum citation (C) were measured in all patients and control in addition to all other routine inves
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show More