Preferred Language
Articles
/
jperc-1424
The Effectiveness of a Training Program for Children with Autism and their Mothers Based on the Picture Exchange Commination System to Confront Some of Basic Disorders for these Children
...Show More Authors

Abstract

The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism and their mothers, they were prepared  by the researcher. The results revealed that there were statistically significant differences between the mean scores of the members of the experimental and control groups in the post-measurement on the Questionnaire of Basic Disorders in Autistic Children in favor of the members of the experimental group. In addition, there are statistically significant differences between the mean scores of the experimental group members in the pre and post-measurements on the Disorders Questionnaire on the basic characteristics of autistic children in favor of the post-measurement. There were no statistically significant differences between the mean scores of the experimental group members in the post and tracer measurements on the Questionnaire of Basic Disorders in Autistic Children. The study recommended training mothers on the Pictures exchange program, and various training programs that seek to develop the skills of their children, and how to apply them with autistic children, as well as expanding the adoption of the use of the Pictures exchange system in centers for children with autism. It suggested conducting studies similar to the current study, dealing with the effect of using training programs based on positive behavior support, and its impact on reducing abnormal behaviors.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (9)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Engineering
The Response of Some Properties of (Al-Si-Mg) Alloy to Nano-Ceramic Materials’ Addition
...Show More Authors

Al-Si alloys which are widely used in engineering applications due to their outstanding properties can be modified for more enhancements in their properties. Current work investigated the ability of these alloys to be modified by casting them through the addition of nanoparticles. So, Multi-wall carbon nanotubes (CNT) and titanium carbide ceramic particles (TIC) with size of (20 nm) were added with different amounts started from (0.5 up to 3%) weight  to cast alloy A356 that was considered to be the base metal matrix, then stirred with different speeds of (270, 800, 1500, 2150) rpm at 520 °C for one minute. The results showed change in microstructure’ shape of the casted alloys from the dendritic to spherical gra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 27 2024
Journal Name
Thi-qar University Journal Of Physical Education Sciences
Arab participation and achievements for men in the Summer Paralympics for the period (2004-2012)
...Show More Authors

This research addresses the necessity due to the scarcity of historical studies in the field of sports, especially those indicating the activities and achievements of Arab countries in the Paralympic movement. This study aims to document the participation of Arab countries in the Paralympic Games, explore the prominent sports in which Arab athletes with disabilities participated, and analyze their achievements during the Paralympic Games from 2004 to 2012. The research methodology adopted an analytical, historical approach, collecting and analyzing data objectively through the official website of the International Paralympic Committee, in addition to scientific and historical sources from research papers, journals, and websites. The key fi

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of strategic Supremacy on strategic success A case study in Thi Qar Governorate
...Show More Authors

Purpose To test the effect of strategic Supremacy on strategic success A case study in Thi Qar Governorate, methodology/approach – this is a mandatory entry.

a case study was used and applied to the Department managers of Government of the province of Thi Qar, Research limitations/implications – It is clear that the strategic Supremacy variable is not being used effectively to achieve strategic success.

Practical implications – use strategic supremacy positively to Support for strategic success. implementing and monitoring ignorance of them in how to use thi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
The Effectiveness of a Simulation Model of Thermal Insulation in Building Materials Using Cellulose Extracted from Agricultural Waste in Baghdad
...Show More Authors

This study found that one of the constructive, necessary, beneficial, most effective, and cost-effective ways to meet the great challenge of rising energy prices is to develop and improve energy quality and efficiency. The process of improving the quality of energy and its means has been carried out in many buildings and around the world. It was found that the thermal insulation process in buildings and educational facilities has become the primary tool for improving energy efficiency, enabling us to improve and develop the internal thermal environment quality processes recommended for users (student - teacher). An excellent and essential empirical study has been conducted to calculate the fundamental values ​​of the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Success Of The Project Management In light of the Learning Organization Characteristics field reserche for the opinion of simple of worker at the State Commission For Road and Bridge
...Show More Authors

Abstract                                                                                                                       &nbsp

... Show More
View Publication Preview PDF
Crossref