Crime has become a phenomenon associated with human socialization. Wherever human groups are found, a crime, which differs from one society to another, is found. It is one of the most dangerous social issues that undermines the solidarity of a given society. This is because it establishes a takeoff from community's norms, values, customs and traditions, and thus turns into a danger to the lives of people, groups and society that threatens its strength and security. The paper focuses on the crimes that violate the social law, like child rape, incest and electronic extortion, which are increasing in size, increasing as a result their repercussions on the human society. The study seeks several objectives, including: examining the nature and dimensions of crimes that violate the values and system of social control and their repercussions. It also investigates the reasons that led to the spread of these crimes breaching accordingly the social law and the value system. This study is a descriptive and analytical one which relied on the social survey using a sampling method. The sample of the study was 150 intentionally selected inmates deposited in some prisons of the Iraqi Correctional Department of perpetrators of child rape, incest, electronic extortion. Besides, 50 social workers and researchers were intentionally selected, too. The data was processed statistically, using (SPSS) program. Moreover, observation, interview tools were used to record information. Results have shown that most of the perpetrators of social transgression crimes, (61.3%), are of lowest levels (illiterate, read and write, primary). Further, the majority of the sample members are males, (127) with a percentage of (84.7%). Finally, it has been found that most sample members (58.0%) came from poor class and sufferred from conditions of weakness.
Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreCurrent research included preparation, characterization of some new chitosan- hydroxy benzaldehyde-Schiff bases with maleic anhydride. The present study aimed to the synthesis and characterization of novel chitosan Schiff base compounds using para- hydroxy benzaldeh and maleic anhydride. The derivative of the schiff-chitosan base, which is associated with different drugs, has been replaced with different amino and hydroxy drugs. The derivative is characterized by different analytical techniques. The results of FT-IR studies clearly indicate construction of the chief amine group in chitosan and the emergence of new bands that correspond to the association of maleic anhydride with the chitosan base. TGA, 1
... Show MoreThat the government sector takes a big place in the countries and represents a significant role in the face of challenges and adaptation to the important and necessary changes that occur today, including the use of electronic. The electronic computer is a requirement of modern technology in various fields of science, including accounting, Because it derives its entity and content from the spirit of society and its mentality in all its branches, especially the subject of the research system of government accounting Because of its impact on the planning and financial implementation, especially in the preparation and implementation of the State budget, along with expenditure and revenue. Addressing tells us that the first of the sear
... Show Moreمستخلص البحث أهمية البحث عن طريق إعداد برنامج تدريبي يعتمد هذه الطريقة التدريبية في تطوير التحمل الخاص عن طريق العمل على بناء مستوى جيد من التحمل الخاص لدى اللاعبين الشباب في مرحلة الإعداد الخاص, تحقيق نتائج جيدة على مستوى أداء الواجبات المهارية والخططية المطلوبة منه في أثناء زمن المباراة, حيث ارتأت الباحثة من خلال إعداد برنامج تدريبي إلى رفع مستوى (التحمل الخاص) لدى لاعبي كرة القدم وبالتالي يمكنها أن تساع
... Show MoreThe aim of research is to identify the effect of using Waks strategy upon acquiring the psychological concepts and mind habits for students in the college of education. An experimental design with a partial adjustment of two experimental and control groups as well as a posttest were employed. The researcher divided the study sample into two groups: group one consisted of (38) students to represent the experimental group that was taught according to the waks strategy, and group two consisted of (35) students to represent the control group that was taught according to the traditional method. The sample was chosen based on some variables namely (Intelligence, Prior knowledge). The researcher has designed the research tools as th
... Show MoreThis study investigated the effect of using brainstorming as a teaching technique on the students’ performance in writing different kinds of essays and self regulation among the secondary students. The total population of this study, consisted of (51) female students of the 5th Secondary grade in Al –kawarzmi School in Erbil during the academic year 2015-2016. The chosen sample consisted of 40 female students, has been divided into two groups. Each one consists of (20) students to represent the experimental group and the control one. Brainstorming technique is used to teach the experimental group, and the conventional method is used to teach the control group. The study inst
... Show MoreThe research aims to identify the effect of teaching according to the augmented reality on the technique of the visual thinking skills among scientific fifth-grade students in a biology course. In order to achieve the goal of the research, the researcher adopted the experimental approach with the partial set of the two equal groups with the dimensional test of visual thinking skills, The research population represented all the scientific students of the fifth grade for morning government schools affiliated to the General Directorate of Education of Baghdad / Karkh II, alshakerin preparatory for boys was chosen intentionally, in which two groups were chosen for this study, one group is chosen randomly as the control group via lottery, whe
... Show MoreAn experiment was conducted to study the effect of the sprayer type according to the source of power and the size of the spray nozzle concerning the quality of the spray produced and fuel consumption.Two types of sprayers were used: a conventional boom sprayer (S1) and a modified (electrified) boom sprayer (S2), along with three sizes of the XR TeeJet 110 spray nozzle (N). The following technical performance indicators were examined: Density of coverage (drops/cm2) using ImageJ software, a 600dpi business card scanner, specifically the ScanShell 800N by CSSN, Inc, and water-sensitive paper (WSP), rate of spray nozzles discharge (ml/min), and fuel consumption (liters/hectare) using a c