The self-awareness interactions reflects with emotions,assess the child in respect to its relations with the social standards; they are not merely simply reactions , but rather they connect with his moral behavior and other 's thinks. When the self- awareness gets developed with emotions within the child , the latter become highly sensitive, causing him prone to be blamed . AS a result , the children test the self –awareness interactions with emotions and in age 3 years , where the self –awareness interactions with emotion clearly link to the self- assessment. The children in stage of kindergarten could not describe the self-awareness interactions accurately ; they test it under different circumstances in comparison to the youngest one. Based on the recommendations of emotionally child bringing up conference held in Cairo in 2007, it is necessitated to concern over the official and semi- official educational institutions that could have an emotion effect upon the child ; besides, the conference also confirmed to study the child emotionally and how to promote it for bringing up a new generation endowing with strong will and sincere ( Al-Hawarna- 2007). The study has indicated that the self-awareness with emotions and its integration with others have a relation to appear behavior problems within the children and having a big role on the psychological and social development for the children. The self-awareness with emotions has an important impact on the children for a success in life and for preserving the relations with the family and colleagues. If the children are not to be aware with their emotions , they will find difficulty in making decisions logically or to get integrated with others ; thus , they have an opportunity to response to the social attitudes to help others in correct ways and to avoid the decisions that lead to incorrect results( Elias and Weissber 2000). The two researchers have indicated that the child needs to learn some vocabularies indicating to emotions and feelings and reasons for such reasons and other alternatives in order for the child to have an opportunity to represent his emotions to be used in correct way. . ( Al-Shimari-2005) sees that the method of assistance represents as a means for social interaction having clear effect in the exchange between the individual and his family and between the individual and others ( Al-Shimari , 2005, 98). The current research aims to : Measure the self- awareness with emotions with the kindergarten children ( sample of the research males and females ) Measure the method of assistance within the kindergarten children ( sample of the research males and females ) Knowing the relationship between the self- awareness with emotion and integration with others among the kindergarten children. ( males and Females) For verifying goals of the research , the researcher has prepared three scales ( scale of self-awareness with emotion, scale of integration with others and scale of assistance ) . For ascertaining the reliability and consistence, the three scales have been applied on the sample 400 child who have been randomly chosen from 20 kindergartens . After processing the statistic data , the scales have been applied on the basic sample 600 child who have been randomly chosen . The researcher has reached to the following results: The sample of the research of females enjoys with self-awareness with emotion. The sample of the research of females enjoys with integration with others The research sample of females enjoys with the method of assistance.The integration with others is consistent relationship , the more the integration with others gets increased , the more the self-awareness with emotion increase. The more the method of assistance increases , the more self-awareness with emotion increases. The independent variables affect the method of assistance. In the light of the results , the researcher has submitted a set of recommendations and suggestions.
Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThe Bangestan reservoir, which occurs in the Ahwaz oilfield, consists of the middle Cretaceous limestone Ilam and Sarvak Formations that were deposited in the Zagros Basin. The reservoir is divided into ten Zones (A to J) formed in the upper Albian-Santonian and contains considerable hydrocarbon accumulations. The limestones were deposited on an extensive shallow carbonate platform on a passive margin and are dominated by rudist biostrome and grainstone facies. Paleogeographical changes mean that identification of the facies is complex. Seismic stratigraphy and isotopic data are used to better understand the structural and geological setting and develop an understanding of the sedimentary environment. The results show that the rudist biostr
... Show MoreEpilepsy is one of the most common diseases of the nervous system around the world, affecting all age groups and causing seizures leading to loss of control for a period of time. This study presents a seizure detection algorithm that uses Discrete Cosine Transformation (DCT) type II to transform the signal into frequency-domain and extracts energy features from 16 sub-bands. Also, an automatic channel selection method is proposed to select the best subset among 23 channels based on the maximum variance. Data are segmented into frames of one Second length without overlapping between successive frames. K-Nearest Neighbour (KNN) model is used to detect those frames either to ictal (seizure) or interictal (non-
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
Efficient operations and output of outstanding quality distinguish superior manufacturing sectors. The manufacturing process production of bending sheet metal is a form of fabrication in the industry of manufacture in which the plate is bent using punches and dies to the angle of the work design. Product quality is influenced by plate material selection, which includes thickness, type, dimensions, and material. Because no prior research has concentrated on this methodology, this research aims to determine V-bending capacity limits utilizing the press bending method. The inquiry employed finite element analysis (FEA), along with Solidworks was the tool of choice to develop drawings of design and simulations. The ASTM E290
... Show MoreThis study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show More