Preferred Language
Articles
/
jperc-705
The non right behavior appearance for the kindergarten children and its relation with the kindergarten teaching style
...Show More Authors

The kindergarten teacher play a role in fixing the children behavior so she must plant the value and the habits that make a positive behavior and accepted by the society so the teacher must know all the right educational psychological styles to fix the children behavior and make them accepted psychologically and socially so the problem of the research start from knowing the relation between the methods of dealing with the kindergarten’s teachers and the non right behavior appearance for the kindergarten children. The current research aims to measure the negative behavior appearance of the children of kindergarten and distinguish it according to (sex and levels) and to distinguish the most using styles by the teachers of kindergarten and its relation with the used styles and the non right behaviors appearance of kindergarten children.

The sample of the research consisted of 10 kindergarten and 200 child equally divided on the kindergarten and the introductory levels and the teachers samples were 100 teacher.
And it had been sure of the honesty and the behavior appearance meter was proved and its fixed coefficient reaches (0.86) and it been sure of the honesty and the teaching styles and the fix meter and its fixed coefficient reaches (0.85).one of the most important statistic figures which been used and the news been used for one sample and for two independence samples and the person coefficient connection and Alfa equation.

The current research showed that the kindergarten had a non right behavior by a big degree and the males have more bad behaviors than the females especially in the introductory the current research show that there is an opposite indecency between the democratic styles and the non right behavior and the finally the research came up  with recommendations and proposals.     

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 03 2023
Journal Name
Biomedical And Pharmacology Journal
The Significance of Remdesivir and Favipiravir Therapies to Survival of COVID-19 Patients
...Show More Authors

The coronavirus disease 2019 (COVID-19) pandemic and the infection escalation around the globe encourage the implementation of the global protocol for standard care patients aiming to cease the infection spread. Evaluating the potency of these therapy courses has drawn particular attention in health practice. This observational study aimed to assess the efficacy of Remdesivir and Favipiravir drugs compared to the standard care patients in COVID-19 confirmed patients. One hundred twenty-seven patients showed the disease at different stages, and one hundred and fifty patients received only standard care as a control group were included in this study. Patients under the Remdesivir therapy protocol were (62.20%); meanwhile, there (30.71

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Sep 30 2012
Journal Name
College Of Islamic Sciences
The life of Imam Abi Al Qasim, Al-Rafii and his scientific efforts
...Show More Authors

In the Name of God, the Most Gracious, the Most Merciful

    Praise be to God, who has revealed the book, in which there are clear verses, insight and remembrance for the first people, and he promised those who learned it and did it with great rewards, and prayers and peace be upon those who pronounced the right and separated the speech, and on his family and companions the best of family and companions, and who followed them and guided them to the day of Moab .... ..
     And yet: If we ponder a brief period and look at our course at a glance, we will find that those who lead us are the prophets, and those who guide us are the guardians, and those who protect us are the martyrs, an

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
The Preparation of some New Mannich and Shiff bases derived from 2-Mercaptobenzimidazole
...Show More Authors

The present work involved two steps: the first step include Mannich reaction was carried out on 2- mercaptobenzimidazole using formaldehyde and different secondary amine or amide to gives the compounds(2-16). The secnd step include preparation of (Ethylbenzimidazoly-2-mercaptoacetate)(17) from the reaction of 2- mercaptobenzimidazole with ethylchloroacetate than prepared hydrazide derivative[18]from reaction of compound(17) with hydrazinehydrate. Followed Preparation of shiff bases(19-24) and there reaction with mercaptoacetic acid to give a new compounds containing thiazolidinderivetives(25-30).Structure confirmation of all prepared compound were proved using FTIR and element analysis (C.H.N.S) and mesurmentedmelting poi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
International Education And Culture Studies (iecs)
The Impact of Virtual Trips on Lateral Thinking and Middle School Student’s Achievement
...Show More Authors

Publication Date
Fri Oct 10 2025
Journal Name
Pharmakeftiki
Genetic polymorphisms and adverse effects that affect the natalizumab clinical response: a review
...Show More Authors

The clinical response to natalizumab in patients with multiple sclerosis (MS) may be significantly influenced by genetic variation. Mutations in genes related to the drug’s mechanism of action or the pathological milieu of MS can contribute substantially to interindividual differences in treatment outcomes. This review aims to provide an overview of previous studies that have examined genetic polymorphisms associated with the clinical efficacy of natalizumab. A systematic literature search was conducted across the PubMed, Google Scholar, and ResearchGate databases using targeted keywords relevant to the subject matter. Several genetic loci were found to be linked to natalizumab responsiveness, including the integrin subunit alpha 4 (ITGA4

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 18 2025
Journal Name
Sustainable Engineering And Innovation
Using fruit fly and dragonfly optimization algorithms to estimate the Fama-MacBeth model
...Show More Authors

This research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f

... Show More
View Publication
Crossref
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
Study the correlation between Sunspot Number and Solar Flux during Solar Cycle 24.
...Show More Authors

Abstract

     In this research, a study of the behavior and correlation between sunspot number (SSN) and solar flux (F10.7) have been suggested. The annual time of the years (2008-2017) of solar cycle 24 has been adopted to make the investigation in order to get the mutual correlation between (SSN) and (F10.7). The test results of the annual correlation between SSN & F10.7 is simple and can be represented by a linear regression equation. The results of the conducted study showed that there was a good fit between SSN and F10.7 values that have been generated using the suggested mutual correlation equation and the observed data.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Budget Programs and Performance away to enhance the control in government economic units
...Show More Authors

     The control function of important functions in the system of government for several reasons , perhaps the most important of the magnitude of spending and spending in one of the tools adopted in the implementation of the control function.                               

        Perhaps the most prominent stages of the development budget in terms of setup and use in the budget programs and performance , as specialized literature  show its importance in strengthening financial and operationl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref