Preferred Language
Articles
/
jperc-507
The educational violence and it's reflections on study attainment of the primary stage pupils
...Show More Authors

Chapter-1

Problem of the research: 

The studies and researches have noticed the aggravation of violence practice in all educational means using different and innovated styles against children in the school and house in order to upbringing by the parents or the school .

It is a training method for the person to participate in the society and prepare him to be an effective member.

The current research confines the children in age (6-12) years old representing the primary stage who face different kind of violence during the familiar or school education.

The current research aims to:

1 – The kinds of violence which happens to the children in the primary stage in both familiar and school kinds .

2- The value of educational violence reflections on study attainment .

Violence is defined as every action causes a hurt (moral, material, phonetic, bodily) practice individually or collective then put the child in confrontation with an act (the purpose from it is violence) .

Chapter-2

Kinds of violence:

Kinds and forms of violence can be briefed into:

1 – According to its nature is divided to:

a – Innate violence .

b – Acquired violence .

2 - According to the type of violence is divided into:

a – Material violence .

b – Moral violence .

3 – According to the pointed side is divided to:

a –Against the others violence .

b- Self violence .

4 – According to the legality of violence is divided to:

a –Official violence .

b- unofficial violence .

5 – According to the reason:

a –Attacking violence .

b- Defending violence .

6 – According to the actor:

a –Individual violence .

b- Collective violence .

Theories of violence:

The important theories which tried to explain the violent behavior are :

a – The classical psychological theory .

b – The modern psychological theory .

Former studies:

 Gibb study (1983).۩

Cooper & Mackie study (1986). ۩

Chapter-3

After discussing the violence theories they reached to adopt the theory of (Pandora), because it is the nearest theory in explaining the violence phenomenon, and it is portrayed in universality and assert the role of parents and friends and playing group and media in developing, the violence phenomenon  , and concerned in studying human and interaction with others .

Chapter-4

The researcher concluded:

That the imposed violence in communication means led to aggressive behavior respond, and the vocal and body violence causes harm, hurt, pain to oneself, loneliness, and disappointment.

The researcher recommended:

Public awareness and introduce instruction, and curative programs explaining the danger of violence and the means to cure avoid it. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Prepodavatel Xxi Vek
The Structure of Russian Participles: Special Features of the Grammar Meaning of State
...Show More Authors

View Publication
Crossref
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
The Role of Glucosamine Chondrotin Sulfate in the Treatment of Osteoarthritis of Knee
...Show More Authors

Background: Osteoarthritis (OA) currently seems
inevitable and unavoidable for a large swath of the
population .its etiology relates to a strong ,but
complex ,non mendelian genetic basis ,combined
with mechanical and metabolic factors that cause
molecular alterations the end results of which
affect the whole joint .Glucosamine and
chondrotin sulfate alone or in combination may be
of benefit to a subgroup of individuals who have
knee pain due to OA.
Glucosamine has been shown to alter cartiage turn
over in patients with OA undergoing physical
training
Aim of the study: To find the validity of
glucosamine chondrotin sulfate in treatment of
grade 1 and 2 OA.
Methods: the sample of 280 patients

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Arpn Journal Of Engineering And Applied Sciences
SURVEY ON VANET TECHNOLOGIES AND SIMULATION MODELS
...Show More Authors

Vehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehi

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
On Large-Lifting and Large-Supplemented Modules
...Show More Authors

      In this paper, we introduce the concepts of Large-lifting and Large-supplemented modules as a generalization of lifting and supplemented modules.  We also give some results and properties of this new kind of modules.

Scopus (1)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Pilgrims tracking and monitoring based on IoT
...Show More Authors
Abstract<p>The pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed </p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
On Monotonically T2-spaces and Monotonicallynormal spaces
...Show More Authors

In this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.

View Publication Preview PDF
Crossref
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Sharia's position on historical statues and monuments
...Show More Authors

A disagreement has arisen among scholars regarding the ruling on historical statues and monuments in Muslim countries, especially after the Taliban blew up some huge historical statues, and we have witnessed different positions that reach the point of contradiction, each claiming to be right, and now that the crisis has passed and the intensity of the dispute has subsided, I see It is appropriate to discuss this issue calmly, without drifting behind this or that party, to find out the legal position on these statues and monuments.
I presented the most prominent modern opinions related to the subject and discussed them in this research, which I called (Sharia’s position on historical statues and monuments), in which I tried to reach

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
On S-acts and bounded linear operators
...Show More Authors

The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
The Necessary and Sufficient Optimality Conditions for a System of FOCPs with Caputo–Katugampola Derivatives
...Show More Authors

The necessary optimality conditions with Lagrange multipliers  are studied and derived for a new class that includes the system of CaputoKatugampola fractional derivatives to the optimal control problems with considering the end time free. The formula for the integral by parts has been proven for the left CaputoKatugampola fractional derivative that contributes to the finding and deriving the necessary optimality conditions. Also, three special cases are obtained, including the study of the necessary optimality conditions when both the final time  and the final state  are fixed. According to convexity assumptions prove that necessary optimality conditions are sufficient optimality conditions.

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Crossref