Preferred Language
Articles
/
jperc-584
الاشكال المفضلة لدى اطفال الرياض ونسبة توظيفها في تصاميم اثاث الرياض
...Show More Authors

The research explores the shapes preferred by children and the extent to which it can be utilized on the experimental kindergarten at the Woman’s School of Education. To achieve the goal, the researcher has displayed pictures that have been chosen from within the research boundaries which represent four categories: Geometrical shapes which included (squares, rectangles, triangles, and circles), agricultural shapes which included (apples, oranges, bananas, and grapes), motion pictures shapes (cartoon characters) which included (Jerry the mouse, Twitty the bird, Bugs Bunny the rabbit, and Winnie the pooh), and animal shapes which included (dogs, fishes, frogs, and horses) to the sample children of (60) child (boys and girls) that have been randomly chosen from four different kindergartens from the city of Baghdad, with that an observation sheet of the shapes demonstrated was used with two fields (prefer, does not prefer) where the researcher recorded the children’s response. After eliminating redundancies and using the percentile method to draw statistics, the following results came out (from most preferred to least – per category):

  • Geometrical shapes are: rectangular, circle, square, triangle
  • Agricultural shapes: bananas, grapes, apples, oranges
  • Cartoon characters: Twitty the bird, Bugs Bunny the rabbit, Jerry the mouse, Winnie the pooh
  • Animal shapes: fish and horse shared 1st, dog, frog

Then these results were checked against the furniture in the experimental kindergarten at the Women’s School of Education / Kindergarten Department and the results showed that most of these shapes were not utilized at the kindergarten even though it is a standardized kindergarten.

 Based on the results of the research, the researcher advised with recommendations to utilize the shapes most preferred by the kindergarten children in different ways that the children interact with them, for example: Furniture, toys, utensils, teaching tools, beddings, carpets, curtains, etc.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
An Analytical Study of Viewpoint in Parsi Pour's and Ar-Rikabi's Novels: The Dog and the Long Night and Alibaba's Sad Night as Examples: بررسی تحليلی زاویه¬ی دید در رمان¬های پارسی پور و الرکابی باتكيه بر رمان "سگ و زمستان بلند" و "ليل علی بابا الحزین"
...Show More Authors

It is noted in the title that the paper studies the viewpoint in the novel The Dog and the Long Night by the Iranian novelist Shahranoush Parsi Pour and in the novel Alibaba's Sad Night by the Iraqi novelist Abdulkhaliq Ar-Rikabi. Both are well known novelists, and about whose stories and novels many critical books, MA theses, and Ph.D. dissertations have been written. Also, some of their literary works have won prizes. Here, the researcher shed light on the concept of viewpoint, its types, and its importance in novels in general. This was done along with tackling the two viewpoints in both novels, where similarities and differences were identified. For this end, the researcher has adopted the analytic-descriptive appro

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Abuse elder and relationship life review
...Show More Authors

The study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Financial investment strategies – Conceptual Framework
...Show More Authors

The investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .

  &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Baghdad Science Journal
A relationship study of coronavirus (COVID-19) infection, blood groups, and some related factors in Iraqi patients
...Show More Authors

Many studies of the relationship between COVID-19 and different factors have been conducted since the beginning of the corona pandemic. The relationship between COVID-19 and different biomarkers including ABO blood groups, D-dimer, Ferritin and CRP, was examined. Six hundred (600) patients, were included in this trial among them, 324 (56%) females and the rest 276 (46%) were males. The frequencies of blood types A, B, AB, and O were 25.33, 38.00, 31.33, and 5.33%, respectively, in the case group. Association analysis between the ABO blood group and D-dimer, Ferritin and CRP of COVID-19 patients indicated that there was a statistically significant difference for Ferritin (P≤0.01), but no-significant differences for both D-dimer and CRP.

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Teen-Computer Interaction: Building a Conceptual Model with Thoughts- Emotion-Behaviour
...Show More Authors

Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
A comparative reading of the social and political satire in the works of Abu al-Fadl Zrui Nasrabad and Ahmad Rajab (The tadhk: خوانش تطبیقی طنز اجتماعی – سیاسی در آثار ابوالفضل زرویی نصرآباد و احمد رجب(مورد مطالعه: تذکرة المقامات زرویی و نصف كلمة احمد رجب)
...Show More Authors

           Satire is genre of the literary arts that has always been the source of human interest. Because  it is difficult to accept direct criticism, Satire appears as a literary tool in which vices, follies, abuses and shortcomings are held up to ridicule, with the intent of shaming individuals, corporations, government, or society itself into improvement. A satirical critic usually employs irony to attain this goal. Although satire is usually meant to be humorous, its greater purpose is often profitable social criticism, using wit to draw at

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
Divine orders Divine orders directed to his prophets (peace be upon them): Divine orders directed to his prophets (peace be upon them)
...Show More Authors

 

ملخص البحث:

    ان الله تعالى هو الذي خلق جميع المخلوقات ، والذي بيده الموت والحياة وان كل هذه المخلوقات تحتاج الى اوامر ، وهذه الاوامر الالهية وجهها الله لعبادة بوساطة انبياءه ( عليهم السلام) فكانوا هم اول المستسلمين والمنقادين لأوامره ، فجاءت الآيات الكريمة مخاطبة للأنبياء واقوامهم بشكل عام ولنبينا محمد (r) بشكل خاص.

اما عن المضمون البحثي فقد جاءت مادته مقسمة الى ثل

... Show More
View Publication Preview PDF