The current research aims to identify the types and rates and the reasons for the crimes that are with the origin and sexual scattered deviation between the fabric of Iraqi society, which reticent about because of the culture of the community, where he offered a researcher investigator justice and tribal leaders and lawyers about proportion and the types and causes of crime is the origin of sexual deviance and finally a question asked a researcher in 1000 young lived their adolescence days of the former regime (1979-2003) from going to brothels researcher found that 920 people and 92% had gone to the house to practice adultery and that 70 of them, and by 7% had engaged in masturbation only and that 10 of them have not committed anything noteworthy and by 1% They have maintained themselves. It found that there are a lot of crimes reticent by the media because of the social values and traditions
This paper is illustrates the sufficient conditions of the uniformly asymptotically stable and the bounded of the zero solution of fifth order nonlinear differential equation with a variable delay τ(t)
Classification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE), Border
... Show MoreFuture wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser
... Show MoreIn this study, dependence of gamma-ray absorption coefficient on the size of Pb particle size ranging from 200µm up to 2.5mm, using different weights of each particle size. The results show that gamma-ray attenuation coefficient is inversely proportional with the size of Pb particle size due to the reduction of the spaces between the lead particles.
EP/ metal composites were prepared as adhesives between two steel rods. Epoxy resin (EP) was used as a matrix with metal as fillers (Al, Cu, Fe,).
The preparation method for tensile adhesion tests includes two steel rods with adhesive composites between the rods to measure adhesion strength Sad and adhesion toughness Gad.
Results of tensile adhesion tests show that EP/ metals composite have maximum strength Sad for certain weight percentage of metals 2.95 and 9MPa at 10% for EP/Al and EP/Cu composite and 8.2MPa at 40% for EP/Fe composites
CO2 Gas is considered one of the unfavorable gases and it causes great air pollution. It’s possible to decrease this pollution by injecting gas in the oil reservoirs to provide a good miscibility and to increase the oil recovery factor. MMP was estimated by Peng Robinson equation of state (PR-EOS). South Rumila-63 (SULIAY) is involved for which the miscible displacement by is achievable based on the standard criteria for success EOR processes. A PVT report was available for the reservoir under study. It contains deferential liberation (DL) and constant composition expansion (CCE) tests. PVTi software is one of the (Eclipse V.2010) software’s packages, it has been used to achieve the goal. Many trials have been done to ma
... Show MoreStudy was made on the optical properties of Ge2oSe8othinfilms prepared by vac-uum evaporation as radiated by (0,34,69) Gy of 13 ray.The optical band gab Eg and tailing band A.Et were studied in the photon energy range ( 1 to 3)eV. The a-Ge20Se8o film was found to be indirect gap with energy gap of (1.965,1.9 , 1.82) eV at radiated by B ray with absorption doses of (0,34,69)Gy respectively.The Ea and AEt of Ge20Se80 films showed adecrease in E8 and an increase in AEt with radiation. This be-havior may be related to structural defects and dangling bonds.
: Cervical cancer representsone of the possibly preventable cancer. The study was designed to find the possible correlation of Tafazzin on the progression of cervical carcinoma. Two groups of paraffinized blocks were included. The study group of 30 cervical tumors as well as 15 biopsies of healthy cervical tissues. After sectioning on a positive charge, immunohistochemical application (IHC) was performed to detect Tafazzin expression. Nighnty percentage (27 out of 30) of the studies group showed positive overexpression as shown in with a significant association of the expression with cervical cancer with a significant association. There is a possible role of TAZ in hastening the development of cervical cancer through different mechanisms. F
... Show MoreThe presence of different noise sources and continuous increase in crosstalk in the deep submicrometer technology raised concerns for on-chip communication reliability, leading to the incorporation of crosstalk avoidance techniques in error control coding schemes. This brief proposes joint crosstalk avoidance with adaptive error control scheme to reduce the power consumption by providing appropriate communication resiliency based on runtime noise level. By switching between shielding and duplication as the crosstalk avoidance technique and between hybrid automatic repeat request and forward error correction as the error control policies, three modes of error resiliencies are provided. The results show that, in reduced mode, the scheme achie
... Show More