Preferred Language
Articles
/
jcoeduw-1678
Alternative Sanctions and their Impact on Societal Security: A Field Study in the Directorate of Juveniles Reformatory in Baghdad
...Show More Authors

Crime is one of the most severe challenges facing States, and strives to find preventive measures, reduce its seriousness, and prevent them; due to developments, crimes have increased, and emerging new patterns of crimes, there is an urgent need to prevent crimes and reduce their effects. Modernizing its punitive system and diverting it to correctional rehabilitative justice to redress the prejudice caused by the crime and rehabilitate the convicted person by using alternative measures to short-term imprisonment. This research emphasizes alternative sanctions' value to minimizing short-term imprisonment penalties and their impact on societal security through several goals like, the negative consequences, justifications, and alternatives applied in Iraq, to identify their impact on societal security. The research was based on the analytical descriptive curriculum and the sample-style social survey. It was based on an intentional sample of (250) Research staff of the Directorate of Juvenile Reformatory in Baghdad to measure the role of alternative sanctions in the correctional aspect, statistically processed through the program (SPSS), one of our most important findings is that (92.33%) of researchers supported that alternative sanctions has a role to reduce overcrowding in correctional schools, and supported (91%) of researchers that they are prohibited from mixing with depositors, and that (90%) of researchers who supported that the application of the penalties would reduce the problems associated with the sentence of imprisonment, i.e., the researchers emphasized the importance of alternative sanctions to minimize the effects of the short-term imprisonment on the convicted person, his family, and his community.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Biomarker Significance of Serum CXCL8, CXCL10 and CXCL16 in Breast Tumors of Iraqi Patients
...Show More Authors

The biomarker significance of three chemokines (CXCL8, CXCL10 and CXCL16) was evaluated in sera of 45 breast cancer (BC) and 28 benign breast lesion (BBL) patients, as well as 20 control women. Clinical stage and tumor expression of estrogen (ER), progesterone (PgR) and human epidermal growth factor receptor-2 (HER-2) receptors were considered in this evaluation. The results demonstrated that CXCL8, CXCL10 and CXCL16 showed a significant increased median in BC and BBL patients compared to control (CXCL8: 47.3 and 25.7 vs. 15.0; CXCL10: 37.6 and 30.7 vs. 13.1; CXCL16; 27.9 and 25.2 vs. 19.2 pg/ml, respectively). The increased levels of CXCL8 and CXCL16 were more pronounced in triple-negative and HER-2 positive p

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Updating the uniform accounting system in Iraq for installment sales transactions framework
...Show More Authors

Due to the intensity of competition between economic units that run the trade in durable goods had to pay a lot of these companies to follow the new selling methods aimed at attracting customers to be able to increase its sales and thereby increase their profits ,  these methods are installment sales, which had been in great demand by the customers with limited income, who provides them with the possibility of possession and use of such goods and to postpone the full amount of the payment to the seller, This transaction sales have grown even became installment sales system at the present time of the common types of sales transactions and deployed a lot in our environment and in many sectors of the market, and in some cases m

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Experimental Work to Study the Behavior of Proppant Inside the Hydraulic Fractures and the Plugging Time
...Show More Authors

Experiments were conducted to study the behavior of the solid particles (proppant) inside the hydraulic fracture during the formation stimulation, and study the effect of the proppant concentration on the hydraulic fracturing process, which lead to bridge and screen-out conditions inside the fractures across the fracture width that restricts fracturing fluid to flow into the hydraulic fracture. The research also studies the effect of the ratio between the fracture size and the average particles diameter “proppant", on fracture bridging. In this study two ratios were considered β= 2 and 3 ,where β=Dt / Dp where: Dt= hydraulic fracture size (width) and Dp=Average particles diameter.

This work pr

... Show More
View Publication Preview PDF
Publication Date
Wed May 26 2021
Journal Name
Energies
Rotational Piezoelectric Energy Harvesting: A Comprehensive Review on Excitation Elements, Designs, and Performances
...Show More Authors

Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect

... Show More
View Publication
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (7)
Scopus Crossref
Publication Date
Sun Jun 27 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Women’s Knowledge about Health Promotion after Cesarean Delivery at Maternity and Pediatric Hospital in Al-Samawa City
...Show More Authors

Objective(s): To assess women’s knowledge about health promotion after a cesarean delivery and to determine the association between women’s knowledge and their demographic data of age, level of education, and monthly income.
Methodology: A descriptive design is carried out to assess women’s knowledge about health promotion after cesarean delivery at Maternity and Pediatric Hospital in Al-Samawa City. This study starts from 26th of September 2020 up to 16th March 2021. Sample of (100) woman who are at reproductive age, pregnant (prime or multipara) who have planned to have birth by elective cesarean section or had previous elective caesarian section without medical indication or women who had cesarean section with medical indicat

... Show More
View Publication Preview PDF