Abstract
The research aims to build a training program to develop some executive functions for kindergarten children. To achieve this goal, the two researchers built the program according to the following steps:
1. Determining the general objective of the program.
2. Determining the behavioral objectives of the program.
3. Determining the included content in the program.
4. Implementing the content of the activities of the program.
5. Evaluating the Program.
The program included (12) training activities, the training activities included several items: the title of the activity, the time of implementation of the activity, the general objective of the activity, the procedural behavioral objective, the means and tools used, the methods and techniques, the content, the implementation of the activity, and the evaluation.
The tax base is one of the bases of the technical organizing of taxes, and that a good selection of the tax base effects the outcome of the tax and its fairness, and with the expansion of the tax range results a dangerous phenomenon called tax evasion, which became threaten the economies of countries and this phenomenon prevents the achievement of the state to its economic, political and social objectives which seeks to resolve this phenomenon and identifying all human and material potential and realize the real reasons that lie behind it. The researcher found that tax authorities are weak in terms of it the technical material and financial abilities, the analysis of data show that then is a significant reve
... Show MoreThis research includes the principles of the democracy، and to which extent it can contribute in establishing these principles. Democracy is not only to hold parliamentary or presidential elections but also the result of these elections wills it lead to the emergence of an integrated regime that can actually expresses the citizen's rights and to which extent those citizens can contribute in that regime and control it. Since 2005، when the first elections took place in Iraq after the US occupation of Iraq 2003، Iraqi people are looking to a rule that represented them and achieve their interests after getting rid of the totalitarian regimes and establishing an institutional regime that work by democratic means in order to achieve the so
... Show Moreهدف البحث إلى وضع رؤية مستقبلية وبناء أنموذج للجامعة المنتجة ، باستخدام أسلوب دلفاي بواقع جولتين إذ عرضت أداة البحث على 30 خبير واعتمدت نسبة 93 %حد أدنى لقبول الفقرة ، واستنتجت الباحثة إن معظم الجامعات لا تتوافر لديها الموارد الكافية وبالتالي فان تبني مفهوم الجامعة المنتجة يمثل أسلوبا مناسبا لواقع التمويل في تلك الجامعات ، إذ أن هناك حاجة ماسة إلى تدعيم مصادر تمويل التعليم الجامعي بموارد إنتاجية تحصل منها الجا
... Show MoreDue to the increasing number of people with in Iraq, it has become necessary to treat seriously this problem, which was not considered significantly to the best of researcher knowledge. Thus, the current research aims to construct a scale to measure the physical down syndromes, which distinguish them from others. It consisted of (39) items. The researcher has presented some related literature that addressed the current problem
The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables