The child spends several hours watching animated films, which affect their behavior negatively and positively. This calls parents to monitor what their children are watching, to show them the serious risks of some violent films, and to direct them toward choosing both positive and educational programs that develop their positive behavior. This study aimed to explore the positive and negative effects of watching animation films as well as to identify the role animation films in increasing the cognitive knowledge of kindergarteners. To do this, the descriptive and analytical methods were used. A questionnaire was adopted as a tool for data collection. A scale of (45) items classified into three categories was applied on the random research sample of 200 mothers of children enrolled in kindergartens in Baghdad, within Karkh district (Directorate of Education in Karkh 1 and the Directorate of Education in Karkh 2). The findings of this study revealed that animation films have many positive and negative effects that significantly can be observed on the behavior of kindergarteners. Moreover, Animation films play an important role in increasing the knowledge of kindergarten children. The study came out with a conclusion; a large percentage of children in our society are addicted to watching animated films. The most important recommendations and proposals recommended by the study are: 1. Parents should work on organizing their children's hours, such as reducing their hours of watching animation films, which takes more time than other needs such as playing, sleeping, eating, and reviewing their lessons. 2. Parents must educate themselves by recognizing the effects of animation flims on children to avoid their risks. 3. The correct and serious awareness of individuals in society about the extent of the negative effects of television and the risks of the content of programs that threaten the ethics, beliefs, culture, and health of our children.
Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
The dependence of the energy losses or the stopping power for the energies and the related penetrating factor are arrive by using a theoretical approximation models. in this work we reach a compatible agreement between our results and the corresponding experimental results.
The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ r
... Show MoreThe downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ rates
... Show MoreHere, we found an estimation of best approximation of unbounded functions which satisfied weighted Lipschitz condition with respect to convex polynomial by means of weighted Totik-Ditzian modulus of continuity
Background: The access cavity is a critical stage in root canal therapy and it may influence the subsequent steps of the treatment. The new minimally invasive endodontic access cavity preparation concept aims to preserve sound tooth structure by conserving as much intact dentine as possible including the pulp chamber's roof, to keep the teeth from fracturing during and after endodontic treatment. While there is great interest in such access opening designs in numerous publications, still there is a lack of scientific evidence to support the application of such modern access cavity designs in clinical practice. This review aims to critically examine the literature on minimal access cavity preparations, explain the effect of minimally inva
... Show MoreIn this article, unless otherwise established, all rings are commutative with identity and all modules are unitary left R-module. We offer this concept of WN-prime as new generalization of weakly prime submodules. Some basic properties of weakly nearly prime submodules are given. Many characterizations, examples of this concept are stablished.
The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreThe paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.