Preferred Language
Articles
/
jperc-1424
The Effectiveness of a Training Program for Children with Autism and their Mothers Based on the Picture Exchange Commination System to Confront Some of Basic Disorders for these Children
...Show More Authors

Abstract

The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism and their mothers, they were prepared  by the researcher. The results revealed that there were statistically significant differences between the mean scores of the members of the experimental and control groups in the post-measurement on the Questionnaire of Basic Disorders in Autistic Children in favor of the members of the experimental group. In addition, there are statistically significant differences between the mean scores of the experimental group members in the pre and post-measurements on the Disorders Questionnaire on the basic characteristics of autistic children in favor of the post-measurement. There were no statistically significant differences between the mean scores of the experimental group members in the post and tracer measurements on the Questionnaire of Basic Disorders in Autistic Children. The study recommended training mothers on the Pictures exchange program, and various training programs that seek to develop the skills of their children, and how to apply them with autistic children, as well as expanding the adoption of the use of the Pictures exchange system in centers for children with autism. It suggested conducting studies similar to the current study, dealing with the effect of using training programs based on positive behavior support, and its impact on reducing abnormal behaviors.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 22 2026
Journal Name
Journal Of Baghdad College Of Dentistry
An In Vitro Evaluation of the Effectiveness of Gotu Kola (Centella asiatica) on Inhibiting the Growth of Selected Microorganismsin Human Saliva
...Show More Authors

Background: Gotu Kola (Centella asiatica) has been used as a traditional medicine for many years to cure different kinds of diseases. Studies have been reported that Gotu Kola extracts might be used as a cure for oral diseases such as periodontal disease. In the present study, Gotu Kola leaves extracted with water will be used to evaluate its effect on some microorganisms living in the human saliva using minimum inhibitory concentration (MIC) method. Material and Method:Gotu Kola fresh leaves extract have been used with water as a solvent, a rotary evaporator was used to separate the solvent from the extract. The following microorganisms: Streptococci, Lactobacilli, and Staphylococcus aureus have been isolated fromthe Saliva of ten voluntee

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
International Journal Of Computer Science And Mobile Computing
Hierarchical Fixed Prediction of Mixed based for Medical Image Compression.
...Show More Authors

Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Develop Proactive System for Risk Management (DPSRM) for Lagging Investment Project in Iraq.
...Show More Authors

To finalize any construction investment project, it would be necessary to identify the most significant problems and obstacles that lead to project reluctance and stalling. Unexpected events and conflicts may have disrupted these strategies and impacted project development. Due to the high initial investment costs of construction projects, crises can have an immediate impact, resulting in significant financial losses. The 2014 financial crisis was one of the most prominent crises that Iraq faced, which prompted the researcher to identify and evaluate those obstacles through this research and questionnaires using Pareto scientific theory to exclude factors that do not contribute to project lag. It was discovered that 28 o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 21 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Reality of Environmental Pollution and The Use of Environmental Taxes to Limit It: Analytical Search for Diesel Generators in Governorate of Baghdad
...Show More Authors

The research depth and dimensions of the problem of environmental pollution resulting from the combustion of fuel used in electric power generators, especially in the summer and you are the national electric power supplied by almost non-existent state where this problem is a local phenomenon that has serious dimensions to human health, as well as the possibility of using a the tax system tools of b (environmental taxes) to reduce these pollutants, so the search is aimed at the types of gases emitted from burning fuel electric generators operating in the province of Baghdad and then measure the amount of environmental pollution as well as compared to the amount of some of these gases, which is more risk to humans with permitted by the Wor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Thu Jan 11 2024
Journal Name
Eximia
Using an educational method according to special exercises to perform the skill of bow and develop flexibility for cub wrestlers in Iraq
...Show More Authors

creating unique exercises utilizing a teaching approach that works with the research sample, determining how special exercises affect the development of torso flexibility, and determining how special exercises affect the development of bow ability. Activate the search The results of the pre- and post-tests for the control and experimental research groups show a statistically significant association that is favoring the post-test in the development of bow skill performance Using the experimental technique, the researcher set up one group and gave them two tests (pre and post) based on scientific theories that made sense for the topic at hand. Forty adolescent wrestlers from the Adhamiya Club in the Baghdad Governorate were recognized

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 21 2022
Journal Name
Journal Of Planner And Development
Use of GIS to study spatial analysis of the migration of nineveh governorate residents for the period 2014-2017
...Show More Authors

The Migration is one of the important dynamic population movement phenomena in population studies because of its great impact in changing many demographic characteristics between the region of origin and arrival. And the multiplicity of forms and types according to the different reasons for it and the motives that prompted the population to move, as well as the currents and their size are also different according to the different causes, and here there are many types of migration, and many of them have been studied at the local and regional levels, and as long as the population is in a continuous dynamic movement, other types of migration are generated. (Al Douri, 2015, 230)          &nbs

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
sEffect of Sb doping on CuAlSe2 thin films and their behavior on the preparation CuAlSe2/Si heterojunction solar cells
...Show More Authors