The child realize that the meals time provide golden opportunities to get the attention the child needs. However, many difficulties that may appear about eating food can be avoided, if the family used the right way in dealing with this problem. The study aims, in this case, at searching for the reasons that lies behind the child's obstinacy in eating his food and the attempt to study some variables that is related to the research topic.
The results are summed up as follows:
- The number of the sample children is 3 of both sexes between the ages of 3 to 6 years
New metal ions complexes of tridentate ligand (1-((dicyclohexylamino) methyl)-3-(1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro-1H-pyrzol-4-ylimino) indolin-2-one) have been synthesized and characterized by chemical-physical analysis. The ligand acts as a tridentate for the complexation reaction with all metal ions. The new complexes, possessing the general formula [M(L)Cl]Cl where M=[Ni(II), Cu(II), Zn(II), Pd(II), Cd(II), Pt(IV) and Hg(II) ] ,show tetrahedral geometry. All complexes ,except Pd(II) complex which has a square planar geometry and Pt(IV) which show an octahedral geometry. The geometry of the prepared compounds has been proposed in another method theoretically by using one of the calculation molecular programs (Hype
... Show MoreHere, a high sensitive method for biomarker identification according to nanostructure, using enzyme-linked immunosorbent assays (ELISAs), called Nano-ELISA, was presented. Different shapes of gold nanostructures (star and sphere; GNSs and GNPs) with a particle size of 40 nm for sphere particles were altered with a monoclonal antibody (Ab) as a detector Ab. To amplify the optical signal, gold nanostructures were employed as carriers of the signaling specific antibody against insulin growth factor binding protein- 3 (IGFBP-3). The substrate was catalytically oxidized by the Horseradish Peroxidase (HRP) conjugated gold nanostructure, and HRP also enhanced the optical signals, reflecting the amount of the targeting IGFBP-3. In comparison to t
... Show MoreThe main problem established by a discovery of a thyroid nodule is to discriminate between a benign and malignant lesion. Differential diagnosis between follicular thyroid cancer (FTC) and benign follicular thyroid adenoma (FTA) is a great challenge for even an experienced pathologist and requires special effort. A developing number of some encouraging IHC markers for the differential diagnosis of thyroid lesions have emerged, including, Hector Battifora mesothelial (HBME-1) and galectin-3 (Gal-3). There was significant positive correlation between Galectin-3 and HBME-1 in follicular carcinoma and follicular variant of papillary carcinoma (r= 0.380, P= 0.041) and (r= 0.315, P=0.047) respectively. There was no significant correlation between
... Show MoreIn the present article, Nano crystalline SnS and SnS:3% Bi thin films were fabricated using thermal
evaporation with 400±20 nm thickness at room temperature at a rate deposition rate of 0.5 ±0.01nm
/sec then annealing for one hour at 573 K for photovoltaic application. The prepared samples were
characterized in order to investigate the structural, electrical, morphological, and optical properties
using diverse techniques. XRD and SEM were recorded to investigate the effect of doping and
annealing on structural and morphological possessions, respectively. XRD showed an SnS phase
with polycrystalline and appeared to form an orthorhombic structure, with the distinguish trend
along the (111) grade,
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreE-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas
... Show MoreImportance of the research:
The importance of any educational or scientific research through its intellectual arena of facts supply the individual and society, Supports Knowledge and Science Group, which raised will be locked in these topics in the future.
This research seeks to shed light on the image and the role of women and men in the books of the Arabic language in primary education (primary), To illustrate the negative effects of the phenomenon of sexism in textbooks, And its negative impact on emerging, And stay away as much as possible about the distinction between the sexes in the roles and qualities in textbooks traditional stereotypes and remove that put both sexes templates hinder the development of the individual and t
Recently, numerous the generalizations of Hurwitz-Lerch zeta functions are investigated and introduced. In this paper, by using the extended generalized Hurwitz-Lerch zeta function, a new Salagean’s differential operator is studied. Based on this new operator, a new geometric class and yielded coefficient bounds, growth and distortion result, radii of convexity, star-likeness, close-to-convexity, as well as extreme points are discussed.