Crime has become a phenomenon associated with human socialization. Wherever human groups are found, a crime, which differs from one society to another, is found. It is one of the most dangerous social issues that undermines the solidarity of a given society. This is because it establishes a takeoff from community's norms, values, customs and traditions, and thus turns into a danger to the lives of people, groups and society that threatens its strength and security. The paper focuses on the crimes that violate the social law, like child rape, incest and electronic extortion, which are increasing in size, increasing as a result their repercussions on the human society. The study seeks several objectives, including: examining the natu
... Show MoreVagrancy is global problem, but its geographical distribution differs from one society
to another and from one place to another inside the same society.Till now there isn't a real factor that can explain the phenomenon, spite that economy plays aconstituent and distinguishing part, and spite the fact that Vagrancy is considered a realdeviation that can be compared with criminality level, and cannot be separated from its effecton family, local society and school. In addition to unprecedented work under heavily pressurethat attack to a minimum protection and safety. Vagrant may be a child, a teen, a young, or
even an old man. Vagrancy thus means different people with different ages and not onlyprecisely children. Vagrant is not neces
This research dealt with the subject of auditing bank credit risks in accordance with international auditing standards and aims to develop procedures and design a credit risk audit program in accordance with international auditing standards and demonstrate their impact on the truth, truthfulness and fairness of financial statements and on their overall performance and continuity in the banking sector Its importance lies in relying on international auditing standards to assess and measure bank credit risk and its impact on the financial situation as well as the ability to predict financial failure. A set of conclusions have been reached, the most important of which is that the bank faces difficulties in measuring credit risk in accordance
... Show MoreThe objective of this research is to know the extent to which Iraqi and Arab companies apply the criteria of accounting for sustainability and disclosure, as well as to analyze the content of the annual financial reports of the companies listed in the financial market to determine their compliance with the Sustainability Accounting Standards Board )SASB(. Annual Report The commitment of telecommunications companies to implement sustainability issues related to the standard of telecommunications services reached a general average of (54%) for the sample of the research sample. This means that there is a degree of admissibility in applying the standard. As well as the highest level of reporting to the criterion of the (Jordan Telec
... Show MoreIn this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreIn this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.
The physician's commitment to medical insight is affected by several factors that vary from patient to patient in terms of the nature of the disease, the severity of the disease, the age of the patient, and the purpose of undergoing medical intervention. There are circumstances surrounding patients that require the physician to reduce the insight towards them, by concealing medical information. The physician must firmly commit to expanding the scope of his vision to a wider extent than in normal medical work. Therefore, we will discuss in this regard the cases in which medical explanation is reduced and the cases that require confirmation in the following order.
Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.