يُعد التنمر ظاهرة إجتماعية قديمة موجودة في جميع المجتمعات سواء أكان المجتمع صناعيًا أم ناميًا، كما يُعد من المفاهيم الحديثة نسبيًا، وربما يرجع لحداثة الإعتراف به نوعًا من أنواع العنف فضلاعن ندرة الدراسات التي تناولته وعدم وجود معيار محدد لتحديد السلوك الذي يعد تنمرًا أم عابرًا، لقد بدأ الأهتمام بدراسة التنمر في سبعينات القرن الماضي وأصبح موضعًا يحضى بأهتمام العديد في مختلف البلدان، وفي عصرنا الحالي تطورت الظاهرة الإجرامية تطورًا ملحوظًا سواء في أسلوب إرتكابها أو مرتكبيها وكل ذلك يرجع إلى التقدم السريع في ثورة المعلومات والإتصالات، فظهرتْ الجرائم الإلكترونية ومنها جريمة التنمر الإلكتروني، وفي نطاق الجريمة الإلكترونية، أختلف الفقه والقضاء في تحديد مسؤولية مزود خدمة الإنترنت وفقًاً لطبعية عمله المتمثل بمدى الرقابة التي يقوم بها على المحتويات غير المشروعة التي تتم عبر الخدمة التي يقدمها في الجرائم الإلكترونية ومنها جريمة التنمر الإلكتروني Bullying is considered an ancient social phenomenon that has existed in all societies for a long time, whether the society was industrialized or developing. Recently, bullying was recognized as a form of violence. Additionally, the interest in studying bullying began in the seventies of the last century and became a topic of interest in many countries around the world. nowadays, the criminal phenomenon has developed remarkably, both in the way it is committed or its perpetrators, and all this is due to the rapid progress In the information and communication revolution, cybercrimes appeared, including the cyber-bullying crime In addition, Jurisprudence and the judiciary have differed in determining responsibility of the internet service provider according to the nature of its work, which is the extent of control it performs on the illegal content that is carried out through the service it provides in cybercrime, including the cyberbullying crime. Le harcèlement est un phénomène social ancien présent dans toutes les sociétés, qu'elles soient industrielles ou en développement. Il est également considéré comme un concept relativement moderne en raison de sa reconnaissance récente en tant que forme de violence, ainsi que de la rareté des études qui l'ont abordé et de l'absence du critère spécifique pour déterminer quel comportement est considéré comme du harcèlement ou toléré. L'intérêt, pour l'étude du harcèlement a commencé dans les années 70 du siècle dernier et est devenu un sujet d'intérêt pour de nombreuses personnes dans différents pays. De nos jours, le phénomène criminel s'est sensiblement développé, que ce soit dans sa manière de se produire ou chez ses auteurs, et cela est dû aux progrès rapides de la révolution de l'information et de la communication. Les crimes électroniques, y compris le harcèlement électronique, ont émergé dans le cadre de la cybercriminalité. Dans ce contexte, les juges et les autorités judiciaires ont divergé dans l'établissement de la responsabilité du fournisseur d'accès internet en fonction de la nature de son travail, qui consiste en l'étendue de son contrôle sur les contenus illégaux qui se produisent par le biais du service qu'il fournit dans les crimes électroniques, y compris le harcèlement électronique.
In the present paper, we have introduced some new definitions On D- compact topological group and D-L. compact topological group for the compactification in topological spaces and groups, we obtain some results related to D- compact topological group and D-L. compact topological group.
In this article we derive two reliability mathematical expressions of two kinds of s-out of -k stress-strength model systems; and . Both stress and strength are assumed to have an Inverse Lomax distribution with unknown shape parameters and a common known scale parameter. The increase and decrease in the real values of the two reliabilities are studied according to the increase and decrease in the distribution parameters. Two estimation methods are used to estimate the distribution parameters and the reliabilities, which are Maximum Likelihood and Regression. A comparison is made between the estimators based on a simulation study by the mean squared error criteria, which revealed that the maximum likelihood estimator works the best.
Songs are considered as an educational and a substantial dependable references used in teaching and learning, particularly the so - called foreign language learning that allows learners to adapt to the target language culture and to develop their language learning skills including: listening comprehension, reading comprehension, speaking and writing. Consequently, it can be said that the Francophone songs with the musical richness and resonance specifically facilities French language learning skills for all levels of education and achieve short and long terms predetermined educational language learning goals.
In fact, language learning through songs method does not only include the
... Show MoreFive bread wheat cultivars was selected namely, IPA99, Tamouz 2, Rasheed, Abu-ghraib And Iraq, were selected for susceptibility to green bug, Schizaphis graminum R.(Aphididae: Homoptera) infestation. Experiments done in under laboratory temperature 20±2C˚, humidity 65±5 % at 12h light. Results have indicated that IPA99 was highly preferred by in S. graminum and no significant of differences with Rasheed and Abu-ghraib, while Iraq and Tamouz2 came second. Although all wheat cultivars were infested by S. graminum except Iraq cultivar which showed some tolerance when exposed to three densities of 5, 10, ap plant during the time of test was 4 weeks. the development time of nymphs were 8, 8, 9, 9.3and 8.3 days for cultivars IPA99, Tamoz2,
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreA total of 157 clinical samples were collected from different clinical specimens (urine, sputum, blood, swabs, and cannula) from several hospitals in Iraq. Among the samples, 51 isolates (32.48%) of Klebsiella pneumoniae were identified according to morphologicaland cultural characteristics as well as the Enterosystem 18R test. Higher numbers of K. pneumoniae isolates were observed in urine samples (26, 52%) than the other samples, and in females (70.6%) than males (29.4%) (female: male ratio of about 2.4:1). Antibiotic susceptibility of K. pneumoniae against 12 commonly used antibiotics was determined through the disc-diffusion method. The results revealed a higher resistance rate in 51 isolates (100%) against Cephalexin, followed by Ce
... Show MoreThe dynamical behavior of an ecological system of two predators-one prey updated with incorporating prey refuge and Beddington –De Angelis functional response had been studied in this work, The essential mathematical features of the present model have been studied thoroughly. The system has local and global stability when certain conditions are met. had been proved respectively. Further, the system has no saddle node bifurcation but transcritical bifurcation and Pitchfork bifurcation are satisfied while the Hopf bifurcation does not occur. Numerical illustrations are performed to validate the model's applicability under consideration. Finally, the results are included in the form of points in agreement with the obt
... Show MoreThe article analyzes the neologisms that arose in the Iraqi dialect after the 2003 US-British invasion and the fall of Saddam Hussein's regime, according to the theory I advocate: "The Basic Outline of Reference," a developed theory of Arab legacy and cognitive theory, which came out in 1987 in America, so we have used the terminology of cognitive grammar. In this theory it is stated that the reference is the interaction between four components: perception, imagination, imaginative comprehension and the linguistic sign or symbolization (the neological word in this article), which are closely related, so that none of them can be lacking, because they constitute a holistic whole that belongs to a deeper level. Let us
... Show MoreChurning of employees from organizations is a serious problem. Turnover or churn of employees within an organization needs to be solved since it has negative impact on the organization. Manual detection of employee churn is quite difficult, so machine learning (ML) algorithms have been frequently used for employee churn detection as well as employee categorization according to turnover. Using Machine learning, only one study looks into the categorization of employees up to date. A novel multi-criterion decision-making approach (MCDM) coupled with DE-PARETO principle has been proposed to categorize employees. This is referred to as SNEC scheme. An AHP-TOPSIS DE-PARETO PRINCIPLE model (AHPTOPDE) has been designed that uses 2-stage MCDM s
... Show MoreThe study of services in villages is one of the imperative matters that must be focused on, because it leads to increased attention, which reduces the differences between the countryside and the urban. The extent of its.
It is well known that community services need to be reached by a person, unlike the anchor services that reach people, here the population distribution plays an important and prominent role in signing these services, so the dispersed distribution pattern and the gathering pattern appeared in the distribution, thus an effect on the time and distance that the person walked to obtain The services are community-based. Therefore
... Show More