Preferred Language
Articles
/
jperc-1424
The Effectiveness of a Training Program for Children with Autism and their Mothers Based on the Picture Exchange Commination System to Confront Some of Basic Disorders for these Children
...Show More Authors

Abstract

The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism and their mothers, they were prepared  by the researcher. The results revealed that there were statistically significant differences between the mean scores of the members of the experimental and control groups in the post-measurement on the Questionnaire of Basic Disorders in Autistic Children in favor of the members of the experimental group. In addition, there are statistically significant differences between the mean scores of the experimental group members in the pre and post-measurements on the Disorders Questionnaire on the basic characteristics of autistic children in favor of the post-measurement. There were no statistically significant differences between the mean scores of the experimental group members in the post and tracer measurements on the Questionnaire of Basic Disorders in Autistic Children. The study recommended training mothers on the Pictures exchange program, and various training programs that seek to develop the skills of their children, and how to apply them with autistic children, as well as expanding the adoption of the use of the Pictures exchange system in centers for children with autism. It suggested conducting studies similar to the current study, dealing with the effect of using training programs based on positive behavior support, and its impact on reducing abnormal behaviors.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
The Commonest Negative Behavioral Manifestations among Kindergarten Children in the Post-Terrorist Phase: شيماء حارث محمد , امل داود سليم
...Show More Authors

Behavioral and emotional disorders represent one of the commonest problems facing children in particular and disturbing their parents and educators in general. This is because Iraqi people have long been living in difficult conditions and faced various terrorists’ operations, such as killing, destruction, robbery, and looting. Such operations are said to be one of the reasons that leads to the development of such disorders, and may negatively affect the psyche of the child and be reflected on his behavior as represented by playing with the IPad for hours, and suffering from nightmares. Accordingly, the current research aims to examine specifically the commonest negative behavioral disorders among kindergarten children during the post-t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Journal Of Baghdad College Of Dentistry
Caries risk assessment of a sample of children attending preventive specialized dental center in Al Resafa, Baghdad
...Show More Authors

Background: Young children’s oral health maintenance and outcomes are influenced by their parent’s knowledge and beliefs, which affect oral hygiene and healthy eating habits. This study aims at assessing caries risk in children aged 6 months to 6 years attending the Specialized Center of Preventive and Pediatric Dentistry Center at Al-Resafa sector in Baghdad. Materials and Methods: A cross-sectional study was conducted from 15 May – 15 June 2018, all children attended the center (80 children) were assessed by using the standard caries risk assessment tool of the American Academy of Pediatric Dentistry (AAPD). Results: The highest percentage of children was as follows: no fluoride exposure 44(55%), did not brush 46(5

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Social Loafing and its Relation to the Personality Traits of Kindergarten Teachers: ابتسام سعيد احمد
...Show More Authors

The research seeks to know the social loafing of kindergarten teachers and their relation to personality traits. In order to achieve the research objectives, the researcher constructed the social loafing scale, which she applied to kindergarten teachers. The scale consists of (22) paragraphs. It has good credibility and stability. The coefficient of stability (85.0) was the retest method and (81.0) Alpha Cronbach equation. In addition, the researcher has adopted (Raymond Cattel) personality traits scale, which has been adapted to the Arab environment (Abdel Rahman and Abu Abada,1998), The scale consists of (39) paragraphs, and enjoys the apparent honesty. The measure of social loafing and the measure of personality traits was applied to

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 28 2021
Journal Name
Misan Journal For Physical Education Sciences
The Effectiveness of Using Generative Learning Model in Learning Kinetic Series on Rings and Horizontal Bar In Artistic Gymnastics for men
...Show More Authors

The aim of this study was to identify the effectiveness of using generative learning model in learning kinetic series on rings and horizontal bar in artistic gymnastics for men ,Also, the two groups were better in learning the two series of movements on the rings and horizontal bar . The experimental method was used to design two parallel groups with pretested and posttest .The sample included third graders at the College of Physical Education and Sports Sciences - University of Baghdad ,The third class (d) was chosen to represent the control group that applied the curriculum in the college, with (12) students per group. After conducting the tribal tests, the main experiment was carried out for (8) weeks at the rate of two units per week di

... Show More
Preview PDF
Publication Date
Fri Sep 01 2017
Journal Name
Journal Of Language Teaching And Research
The Effectiveness of Role Play Techniques in Teaching Speaking for EFL College Students
...Show More Authors

The paper investigates the impact of role-playing as a classroom technique on Iraqi EFL students’ speaking skill on Iraqi EFL students at the college level. The students are 40 college language students in University of Baghdad, College of Education Ibn-Rushd randomly chosen. Then, they were divided into two groups, experimental and control groups. Thirty questions were applied to both groups as a pre-test of speaking and the students asked to answer them orally. The experimental group was taught speaking skill of the targeted role-play technique while the control group was taught in traditional method. After 20 lessons of the teaching, the post-test of speaking was conducted in which the students in both groups were asked to answ

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (32)
Scopus Crossref
Publication Date
Wed Aug 01 2012
Journal Name
I-manger's Journal On Information Technology
A MODULE FOR ENHANCING RECOGNITION SYSTEM FOR QR CODE SCANNED IMAGE
...Show More Authors

A QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.

Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
The Potential of some Plant Extracts as Radical Scavengers and Dipeptidyl Peptidase-4 Inhibitors
...Show More Authors

Seeds, beans, leaves, fruit peel and seeds of five plants (Ferula assa-foetida, Coffea robusta, Olea europaea, Punica granatum and Vitis vinifera, respectively) were extracted with four solvents (distilled water, 80% methanol, 80% acetone and a mixed solvent that included methanol, ethanol, acetone and n-butanol at proportions 7:1:1:1). Such manipulation yielded 20 extracts, which were phytochemically analyzed for total polyphenols (TP) and flavonoids (TF). The DPPH (2,2-diphenyl-1-picrylhydrazyl) radical scavenging activity (RSA) and DPP-4 (dipeptidyl peptidase-4) relative inhibition activity (RIA) were also assessed for each extract. The results revealed that mixed solvent extract of V.

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2017
Journal Name
Archive Of Mechanical Engineering
Using the Lid-Driven Cavity Flow to Validate Moment-Based Boundary Conditions for the Lattice Boltzmann Equation
...Show More Authors
Abstract<p>The accuracy of the Moment Method for imposing no-slip boundary conditions in the lattice Boltzmann algorithm is investigated numerically using lid-driven cavity flow. Boundary conditions are imposed directly upon the hydrodynamic moments of the lattice Boltzmann equations, rather than the distribution functions, to ensure the constraints are satisfied precisely at grid points. Both single and multiple relaxation time models are applied. The results are in excellent agreement with data obtained from state-of-the-art numerical methods and are shown to converge with second order accuracy in grid spacing.</p>
View Publication
Scopus (20)
Crossref (17)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (14)
Crossref (5)
Scopus Crossref