AO Dr. Ali Jihad, Journal of Physical Education, 2021
The aim of this study to investigate the sexual harassment, prevention strategies, and the appropriate ways that tackle this phenomena. The current research consisted of four chapter; the first chapter gave a general introduction about the targeted topic followed by the problem of statement, the significance of study, study’s aims, and end with the limitations of study. The second section of chapter one referred to the common concepts of study. Third section addressed the previous studies that related to the current one. Chapter two concerned with the sexual violence against minors. It has four section; first section addressed number of concepts which related to sexual violence. The second section focused on the implications of sexual
... Show MoreA good performance of reinforced concrete structures is ensured by the bond between steel and concrete, which makes the materials work together, forming a part of solidarity. The behavior of the bond between the reinforcing bar and the surrounding concrete is significant to evaluate the cracking control in serviceability limit state and load capacity in the ultimate limit state. In this investigation, the bond stresses between reinforcing bar and reactive powder concrete (RPC) was considered to compare it with that of normal strength concrete (NSC). The push-out test with short embedment length is considered in this study to evaluate the bond strength, bond stress-slip relationship, and bond stress-crack width relationsh
... Show MoreBackground: Pyogenic discitis most frequently occurs
after home delivery, hemorridectomy, and dilatation and
curettage. Discitis is generally due to blood borne bacterial
invasion of the disc from adjacent end-plate via
communicating vessels. Infective discitis remains an
uncommon, but potentially serious cause for back pain.
Delayed diagnosis can occur and a high index of suspicion
may occur.
Methods: The study included 30 patients suffering from
localized low back pain with limitation of movement.
Diagnosis was made by history, physical examination and
investigation mainly E.S.R and MRI.
Results: 50.3% of patient with discitis had a history of
vaginal delivery, 15% had a history of hemorridectomy
We study clusters in warm dark matter (WDM) models of a thermally produced dark matter particle 0.5 keV in mass. We show that, despite clusters in WDM cosmologies having similar density profiles as their cold dark matter (CDM) counterparts, the internal properties, such as the amount of substructure, show marked differences. This result is surprising as clusters are at mass scales that are a thousand times greater than that at which structure formation is suppressed. WDM clusters gain significantly more mass via smooth accretion and contain fewer substructures than their CDM brethren. The higher smooth mass accretion results in subhaloes which are physically more extended and less dense. These fine-scale differences can be probed by strong
... Show MoreHigh performance work systems and general industrial enterprise performance
The concept of privatization is built on the basis of the transfer of assets and services of the public sector to the private sector this concept has appeared in the eighties of the last century whene the high oil prices took place and recession solution swept the world Which called for the freedom of the market and left the room for the private sector to take the initiatine in economic activity. Both the IMF have adopted this thesis in their programs of the structural adjustment in light of external and internal factors helped to Create the conditions to accept thesis that under the pretext of achieving a number of economic goals.
In Iraq in spite of
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreChannel estimation and synchronization are considered the most challenging issues in Orthogonal Frequency Division Multiplexing (OFDM) system. OFDM is highly affected by synchronization errors that cause reduction in subcarriers orthogonality, leading to significant performance degradation. The synchronization errors cause two issues: Symbol Time Offset (STO), which produces inter symbol interference (ISI) and Carrier Frequency Offset (CFO), which results in inter carrier interference (ICI). The aim of the research is to simulate Comb type pilot based channel estimation for OFDM system showing the effect of pilot numbers on the channel estimation performance and propose a modified estimation method for STO with less numb
... Show More