Preferred Language
Articles
/
jperc-507
The educational violence and it's reflections on study attainment of the primary stage pupils
...Show More Authors

Chapter-1

Problem of the research: 

The studies and researches have noticed the aggravation of violence practice in all educational means using different and innovated styles against children in the school and house in order to upbringing by the parents or the school .

It is a training method for the person to participate in the society and prepare him to be an effective member.

The current research confines the children in age (6-12) years old representing the primary stage who face different kind of violence during the familiar or school education.

The current research aims to:

1 – The kinds of violence which happens to the children in the primary stage in both familiar and school kinds .

2- The value of educational violence reflections on study attainment .

Violence is defined as every action causes a hurt (moral, material, phonetic, bodily) practice individually or collective then put the child in confrontation with an act (the purpose from it is violence) .

Chapter-2

Kinds of violence:

Kinds and forms of violence can be briefed into:

1 – According to its nature is divided to:

a – Innate violence .

b – Acquired violence .

2 - According to the type of violence is divided into:

a – Material violence .

b – Moral violence .

3 – According to the pointed side is divided to:

a –Against the others violence .

b- Self violence .

4 – According to the legality of violence is divided to:

a –Official violence .

b- unofficial violence .

5 – According to the reason:

a –Attacking violence .

b- Defending violence .

6 – According to the actor:

a –Individual violence .

b- Collective violence .

Theories of violence:

The important theories which tried to explain the violent behavior are :

a – The classical psychological theory .

b – The modern psychological theory .

Former studies:

 Gibb study (1983).۩

Cooper & Mackie study (1986). ۩

Chapter-3

After discussing the violence theories they reached to adopt the theory of (Pandora), because it is the nearest theory in explaining the violence phenomenon, and it is portrayed in universality and assert the role of parents and friends and playing group and media in developing, the violence phenomenon  , and concerned in studying human and interaction with others .

Chapter-4

The researcher concluded:

That the imposed violence in communication means led to aggressive behavior respond, and the vocal and body violence causes harm, hurt, pain to oneself, loneliness, and disappointment.

The researcher recommended:

Public awareness and introduce instruction, and curative programs explaining the danger of violence and the means to cure avoid it. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 30 2006
Journal Name
Baghdad University
Unpublished Cuneiform Texts From The Reign Of The King Ammi Şaduqa
...Show More Authors

The cuneiform texts considered one of the most important resources which play an important role help us to know how was the economic , politic and religious manner and every thing have relation of the history of Mesopotamia which contain many of information that enrich our knowldgement every side of Mesopotamia civilization since using writing as away to register the science and human knowldgement . The city of Sippar (Abu –Habba ) was one of most important city of ancient Mesopotamia which mentioned as one of first five Mesopotamian cities found before floating and it exposed through excavating rich one of them tablet which some of it dated to old Babylon period . The king Ammi-Saduqa has a big share of tablet we study number of thi

... Show More
Publication Date
Mon Sep 26 2022
Journal Name
Journal Of Advanced Research In Hr And Organizational Management
Entrepreneurial Performance of the Organization According to the Approved Training Strategy
...Show More Authors

The research aims to determine the role of the training strategy with its dimensions of (strategic analysis, formulation of training strategy, implementation of training strategy, evaluation) in the pioneering performance of the organization with its dimensions of (pre-planning , renewal and modernization, efficiency, effectiveness). Important and modern in pioneering performance and training strategy, and in recognition of the importance of the subject and the expected results of the surveyed banks, an analysis was made of the data obtained through field visits in addition to the questionnaire and interviews ,and the most prominent results that were reached were taking the research sample into consideration all the requirements of the trai

... Show More
Publication Date
Fri Apr 01 2016
Journal Name
Astronomy Reports
Ionized gas in the circumgalactic vicinity of the M81 galaxy group
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
From the flags of The Koofic Grammar: Abdullah Al-Tuaal (243A.H)
...Show More Authors

    This research has tackled a scientific figure belongs to Koofi grammatical school. He is Abdullah Al-Tuaal who has occupied the fourth layer among the Koofi grammarians. There was a confusion between him and another Koofi grammarian from the same layer (Mohammed Bin Qaadim) in some old references. This research has clarified this confusion to affirm that they are two different grammarians.This research also tackles the scientific status of Al-Tuaal and the grammatical views that have been ascribed to him in addition to the analysis and discussion of these views. All this in the light of what has been mentioned in grammar books about the issues in which these views were stated.

View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Computing And Digital Systems
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Sep 30 2013
Journal Name
International Journal Of Network Security & Its Applications
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
New Development in the Process for the Production of Polybutadiene Rubber
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Analytical Modeling of Stresses in the Wall 0f the Human Heart
...Show More Authors

The mechanical function of the heart is governed by the contractile properties of the cells, the mechanical stiffness of the muscle and connective tissue, and pressure and volume loading conditions on the organ. Although ventricular pressures and volumes are available for assessing the global pumping performance of the heart, the distribution of stress and strain that characterize regional ventricular function and change in cell biology must be known. The mechanics of the equatorial region of the left, ventricle was modeled by a thick-walled cylinder. The tangential (circumferential) stress, radial stress and longitudinal stress in the wall of the heart have been calculated. There are also significant torsional shear in the wall during b

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 10 2013
Journal Name
Asian Journal Of English Studies
The Use of Restrictive Relative Clauses in Letters to the Editors
...Show More Authors

A restrictive relative clause (RRC hereafter), which is also known as a defining relative clause, gives essential information about a noun that comes before it: without this clause the sentence wouldn’t make much sense. A RRC can be introduced by that, which, whose, who, or whom. Givon (1993, 1995), Fox (1987), Fox and Thompson (1990) state that a RCC is used for two main functions: grounding and description. When a RRC serves the function of linking the current referent to the preceding utterance in the discourse, it does a grounding function; and when the information coded in a RRC is associated with the prior proposition frame, the RRC does a proposition-linking grounding function. Furthermore, when a RRC is not used to ground a new di

... Show More
Publication Date
Sun Feb 10 2019
Journal Name
Iraqi Journal Of Physics
The role of atmospheric non-thermal plasma in the bacteria inactivation
...Show More Authors

Non-thermal atmospheric pressure plasma has emerged as a
new promising tool in medicine and biology. In this work, A DBD
system was built as a source of atmospheric pressure non-thermal
Plasma suitable for clinical and biological applications. E. coli and
staphylococcus spp bacteria were exposed to the DBD plasma for a
period of time as inactivation (sterilization) process. A series of
experiments were achieved under different operating conditions. The
results showed that the inactivation, of the two kinds of bacteria, was
affected (increasing or decreasing) according to operation conditions
because they affects, as expected, the produced plasma properties
according to those conditions.

View Publication Preview PDF
Crossref