The childhood is an important stage in building the character of the individual and where children acquire the most important experiences . providing proper growth requirements of the things follows assist them in achieving a stable and together Childhood is the violence of indicators that can determine whether personal or illness social .the social circumstances experienced community Iraqi and continues through crises successive wars and explosions and the displacement and that these events may lead to changes in the social behavior of individuals and may contribute to the spread of violence in Iraqi society and observed various forms in (home, school, street, and work), so it was natural that a child the first affected by these waves of violence for many reasons related to younger age and kids love to imitate adults and observe their behavior, particularly parents so you must pay attention to the behavior of their impact on the child's personality and psychosocial compatibility within the family and society. From the above it can sum up the problem of the current search the following question:- - Is the psychological and social compatibility has to do with the phenomenon of violence among pre-school children? Through the above it can be released importance of research of the following things. -The current research (within the knowledge of researcher), which dealt with the study of violence for being cause great harm to the individual and society because of its raised serious psychological and social structure of the individual. And on the structure of the family and the community.. -it stvdis an important stage in the life of the individual .oha early childhood If we can build upon together without crises will be reflected on the internal stability and compatibility psychosocial in the next stages -The current research (within the knowledge of researcher) researcher), the first attempt, which dealt with the study of the psychological and social compatibility and its relationship to the phenomenon of violence in early childhood. The current research aimed to:- The children pre-school psycho-social compatibility scale.- Measurement of the phenomenon of violence among children, pre-school -Correlation between the phenomenon of violence and psycho-social compatibility with pre-school children In order to achieve the objectives of the research were adopted psychosocial compatibility measure, prepared by (al-Janabi in 2002) and the scale of violence, prepared by Hayali 2009) where the measvyesbeen applied on a sample of children aged 4-6 years, reaching its size (200 ) boy and girl after extracting the validity and reliability of the two. In doing data analysis through answers parameters were reached: - - that the children of pre-school malnourished in the psychological and social well for them - that children of pre-school stage suffer from the phenomenon of violence among them. - There is an inverse correlation between the negative psychological and social harmony between the phenomenon of violence among a sample search relationship The backing of these results and the researcher developed a number of recommendations and suggestions can be used by educational and community institutions.
Research Summary
The research revolves around the collection of pending hadiths on Abdullah bin Amr bin Al-Aas, may God be pleased with them, and it is required in these hadiths that they be among those in which there is no room for diligence, such as telling about unseen matters, signs of the Hour, or a statement of virtue and reward for obedience, or punishment for disobedience.
The research consists of an introduction, two topics, and a conclusion of the first topic in the translation of Abdullah bin Amr bin Al-Aas, and the second topic, the pending hadiths of Abdullah bin Amr bin Al-Aas, may God be pleased with them, in which there is no room for diligence in collecting and studying
At the end of this rese
Hierarchical temporal memory (HTM) is a biomimetic sequence memory algorithm that holds promise for invariant representations of spatial and spatio-temporal inputs. This article presents a comprehensive neuromemristive crossbar architecture for the spatial pooler (SP) and the sparse distributed representation classifier, which are fundamental to the algorithm. There are several unique features in the proposed architecture that tightly link with the HTM algorithm. A memristor that is suitable for emulating the HTM synapses is identified and a new Z-window function is proposed. The architecture exploits the concept of synthetic synapses to enable potential synapses in the HTM. The crossbar for the SP avoids dark spots caused by unutil
... Show MoreSix species of aquatic snails were sorted from three sites, the irrigation canal of Baghdad University campus (S1), River Tigris at Al-Za'afaraniah district / Baghdad(S2) , and River Euphrates at Al-Haideriah district Al-Najaf province(S2). The species included Melanopsis nodosa ;Melanoides tuberculata ; Thaiodaxsas jordani ; Lymnaea auricularia ; Physa acuta and Bellamya bengalensis. The first specis recorded the highest total number and was found in high density in the R. Euphrates site (S3), while the last species was the most widely distributed species, and found in all study sites. The last three species were found in Tigris river (S2) , while the first and last species were collected from the irrigation canal (S1).The result reveal
... Show MoreComplexes of some metal ions with 2-thiotolylurea were prepared in ethanolic medium using (1:1) (Metal : Ligand) ratio yielded series of neutral complexes as the general formula [M(L)Cl2]. The prepared complexes were identified by atomic absorption FT.IR, UV-Visble spectra, molar conductivity and magnetic properties. From the above data the tetrahedral structure was suggested for all complexes.
Polyaniline (PANI) has been prepared by the oxidation method in order to fabricate it with various concentrations of copper nanoparticles (CuNPs) which produced using the reduction method. Various techniques have characterized pure PANI and PANI doped CuNPs composites, such as fourier transform infrared spectroscopy (FT-IR), X-ray diffraction spectroscopy (XRD), field emission scanning electron microscopy (FE-SEM) and energy dispersive X-ray spectroscopy (EDS), which were provided important information about the structure and morphology of the fabricated polymer nanocomposites. The properties of dielectric permittivity (έ), dielectric loss (ἔ) and electrical conductivity (σ_AC) properties were studied at room temperature versus a range
... Show MoreIn the present investigation, 24 adult dipteran species with forensic importance belonging to 13 genera and 8 families that were collected from different localities of Iraq. The specimens were identified by different taxonomical keys; in addition the date and localities of collecting specimens were recorded.
The study included the investigation of fungi which associated with heavy animal's leather (Cows and Buffalos) and light (Sheep’s and Goats )through different processing stages (raw hides ,dehairing ,pickling,chrome tanned and stainning or finished stages)there were 10 genera and 25 species in addition to sterile fungi associated with animal leathers which included Alternaria ,Aspergillus,Cladosporium,Fusarium, Mucor , Penicillium , Rhizopus , and Trichoderma .Aspergillus and Penicillium have observed in all leather samples and different processing stages, and that the first time isolate two genera Helminthosporium , Stemphylium form leather for staining stage.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More