Crime is one of the most severe challenges facing States, and strives to find preventive measures, reduce its seriousness, and prevent them; due to developments, crimes have increased, and emerging new patterns of crimes, there is an urgent need to prevent crimes and reduce their effects. Modernizing its punitive system and diverting it to correctional rehabilitative justice to redress the prejudice caused by the crime and rehabilitate the convicted person by using alternative measures to short-term imprisonment. This research emphasizes alternative sanctions' value to minimizing short-term imprisonment penalties and their impact on societal security through several goals like, the negative consequences, justifications, and alternatives applied in Iraq, to identify their impact on societal security. The research was based on the analytical descriptive curriculum and the sample-style social survey. It was based on an intentional sample of (250) Research staff of the Directorate of Juvenile Reformatory in Baghdad to measure the role of alternative sanctions in the correctional aspect, statistically processed through the program (SPSS), one of our most important findings is that (92.33%) of researchers supported that alternative sanctions has a role to reduce overcrowding in correctional schools, and supported (91%) of researchers that they are prohibited from mixing with depositors, and that (90%) of researchers who supported that the application of the penalties would reduce the problems associated with the sentence of imprisonment, i.e., the researchers emphasized the importance of alternative sanctions to minimize the effects of the short-term imprisonment on the convicted person, his family, and his community.
The technology and modern social communication medias have contributed to changing many of our concepts about education to a large extent; these technological advancements have created new challenges for the Instructor of course, but on the other hand it did provided him with expressive media, models and strategies that the old methods cannot fulfill, including the flipped classroom strategy, which is one of the modern technical solutions and in it's optimal use it can correct the weakness of the traditional education and can develop the communication skills as a whole among the students, in order to create a positive, active and interactive student.
The current research contained - four chapters: the first one included the methodolog
Purpose: As a result of the sudden and ill-considered trade openness of Iraq after 2003 to the countries of the world in general and the neighboring countries in particular, and in the absence of the necessary support for the national productive forces and the lack of effective standardization and quality control devices, this led to the exposure of most local products, especially agricultural ones, to decline and inability On the competition and thus dumping the Iraqi market, especially the agricultural products, with imported products, this study came to find out the effect that dumping has on the local production of chicken meat and the impact of that impact on the size of the food gap, and whether the results of the practica
... Show MoreVocational education is the basis of contemporary educational movement that aims at satisfying human needs. Societies can develop their human resources via setting programs for the working class as an aspect of the comprehensive national development. Vocational education is the main source of technical cadres the Iraqi labor market requires of the vocational preparatory schools to provide after three years of schooling.
The vocational schools of the governorate of Basra have a number of problems that lead to the lack of proficiency of their graduates. This study is an attempt to identify these problems or obstacles
... Show MoreAbstract The concept of quantum transition is based on the completion of a succession of time dependent (TD) perturbation theories in Quantum mechanics (QM). The kinetics of "quantum" transition, which are dictated by the coupled motions of a lightweight electrons and very massive nuclei, are inherent by nature in chemical and molecular physics, and the sequence of TD perturbation theory become unique. The first way involved adding an additional assumption into molecule quantum theory in the shape of the Franck-Condon rule, which use the isothermal approach. The author developed the second strategy, which involved injecting chaos to dampen the unique dynamically of the bonding movement of electrons and nuclei in the intermediary state of
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreThe aim of this research is to employ the roundhouse strategy to study its impact on the students achievement of the 10th grade in physics and their core thinking. After the application of the research experience and gaining data, which was processed statistically using the statistical packages program (SPSS). The results of the researcher revealed the superiority of the students of the experimental group who studied using the roundhouse strategy on the students of the control group who studied the usual method in the achievement test. As results showed that there were statistically significant differences between the average scores of the experimental group and the average scores of the control group students in the core thinking test and
... Show MoreAccording to the importance of the subject of research, and the importance of the surveyed organization as a dynamic sector of the country in general , The research attempts to suggest to service organizations in general reconsidering the currently adopted mechanisms in the redesign of its functions , and in the services provided industry . The data was collected from (98) Director Mangers , head of department and head of division . The research tool is the questionnaire , which included (50) items . The results show Significant Effect & Correlation relationship between the two variables due to their dimensions . These lead to he application of job enrichment technology will increase the organization's ability to possess efficient hu
... Show MoreThe study was carried out in order to evaluate clinically and laboratory cachectic animals suffering from anemia. Animal examined were 50 cow and calf. The study include clinical, hemato and biochemical test for accurate diagnosis of cachexia in cows and calves . Blood smears were conducted for detection of blood parasites , fecal examination for gastrointestinal parasites and Different parameters were applied for classification of cachexia , depending on bony projection specially ribs and pelvic and generalized muscular atrophy. However , The study revealed an incidence of cachexia and anemia of blood parasites was including Theileria, Anaplasma, gastrointestinal parasites, ten cases were shown foreign body syndrome while other tens wer
... Show Moreهدف البحث إلى بناء مقياسين تخصصين للنزاعات اللاشعورية وحرية الإرادة لمدربي بعض ألعاب القوى والتعرف على مستوى كل منهما لديهم، وإعداد برنامج إرشادي نفسي مستند لرفع مستوى الحالات اللاشعورية وحرية الإرادة للمدربين الذين يعانون من انخفاض مستوى النزاعات اللاشعورية وحرية الإرادة، والتعرف على تأثير البرنامج الإرشادي نفسي في النزاعات اللاشعورية وحرية الإرادة لدى مدربي بعض ألعاب القوى، لتفترض بذلك الباحثة بإ
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show More