Preferred Language
Articles
/
jperc-731
A study and Evaluation of some of the variables in the Stubborn Child behavior in eating his food Between the ages of 3 to 6 years
...Show More Authors

The child realize that the meals time provide golden opportunities to get the attention the child needs. However, many difficulties that may appear about eating food can be avoided, if the family used the right way in dealing with this problem. The study aims, in this case, at searching for the reasons that lies behind the child's obstinacy in eating his food and the attempt to study some variables that is related to the research topic.

The results are summed up as follows:

 

  • The number of the sample children is 3 of both sexes between the ages of 3 to 6 years.
  • The scientific level of the mothers: the highest ratio 80% has the secondary school and the lowest ratios 20% are from different levels the mothers are either have BH degree 90% or MA degree 10%.
  • The patterns the families use to present to the child in cooking are boiled food, fried food, and fresh food.
  • The methods used to convince the child is watching TV 70%, giving encouragements to the child 15%, 10% comparing the child with other children,5% the use of punishment, the effect of the brothers and parents 50%, the effect of the friends' children 50%.

 

Macnmar and Cosheran test is used as indicator of the statistic analysis to the results which reached Macnmar factor of the effect of the child's participation during eating food 22.3% and the effect of the number of times the child participates in making food value is 17.9%. and the value of the change of nutritious behavior of the child when the food is varied is 16.9. A11 the previous values are higher in the beginning that means it is of statistical significance in effecting these variables which equals three time the stubborn child's behavior to be positive. While when the equation applied as indicators to know the effect of the parents in the child's behavior, and the use of encouragement and punishment the value reached the static value 803.85. And this value is higher than the tabled value which is 9.31 and this gives meaning that the results are of statistic significance at the level 0.01.

Consequently it is discovered that eating by force leads at the end to indigestion and the food will not be absorbed in a normal way. The success in the nutrition process needs patience and wide heart from the side of the parents, because may be the family might guide the child behavior in a direct and the right way and teach him what he needs and train him/her the right behavior. The methods of raising the children and guide them to what is good and avoid and fearing what is evil or what bother or irritate them is the style of the Islamic education and the nature Allah ( be praised) created man on to love of the good, heavenly, prosperity, and survival.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 04 2023
Journal Name
Aip Conf. Proc
Double LA-transform and their properties for solving partial differential equations
...Show More Authors

Scopus (6)
Scopus
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Mobile-based Human Emotion Recognition based on Speech and Heart rate
...Show More Authors

Mobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to   record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Communications In Computer And Information Science
Audio Compression Using Transform Coding with LZW and Double Shift Coding
...Show More Authors

Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
The First National Conference On New Perspectives In Interpreting And Translation Studies And Teaching English As A Foreign Language
Promoting Peace by Althusserian and Foucauldian Reading ofLiterature: Sinan Antoon’s I’jaam
...Show More Authors

This study seeks to investigate Sinan Antoon’s I’jaam (2004) through applying different theoretical frameworks including those of Althusser (1971) and Foucault (1978). Antoon, considered as one of the most internationally recognized Iraqi writers, wrote this dystopian, war novel in Arabic and translated it to English. Antoon’s emphasis placed on literature acting as an oppositional political voice has, in turn, created its own form of censorship inside the fictional world and outside the actual state censorship during Saadm Hossein reign. Thus, particular political messages within literary texts, like I’jaam, have been received with critical attention. The writing culture in Iraq has established an atmosphere in which literary criti

... Show More
Publication Date
Wed Aug 01 2007
Journal Name
Al-nahrain Journal For Engineering Sciences
Monitoring and Control on Impressed Current Cathodic Protection for Oil Pipelines
...Show More Authors

This research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 04 2021
Journal Name
Iium Engineering Journal
RELIABLE ITERATIVE METHODS FOR SOLVING 1D, 2D AND 3D FISHER’S EQUATION
...Show More Authors

In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Sat Sep 12 2020
Journal Name
Al-kindy College Medical Journal
Antenatal, Intrapartum, and Postnatal Maternal health Care during COVID-19 Pandemic
...Show More Authors

There is limited data and evidence about the effects of COVID-19 on Maternal health, especially when new information is emerging daily, through pregnancy, child birth and post natal period, women are vulnerable to have the infection, this article, aimed to show the suitable measures that should be applied for women at reproductive age who are suspected /confirmed with COVID -19 infection,

During pregnancy it is advisable to continue the antenatal care schedule, although reducing face to face visit is recommended (unless the pregnant condition required that ),and prioritize ANC at health facilities for high-risk pregnancy and during second half of pregnancy with adequate infection prevention control  measures.

Regardi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Image restoration using regularized inverse filtering and adaptive threshold wavelet denoising
...Show More Authors

Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .

                In this paper  a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering  and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet

... Show More
View Publication Preview PDF