The current research aims to identify the types and rates and the reasons for the crimes that are with the origin and sexual scattered deviation between the fabric of Iraqi society, which reticent about because of the culture of the community, where he offered a researcher investigator justice and tribal leaders and lawyers about proportion and the types and causes of crime is the origin of sexual deviance and finally a question asked a researcher in 1000 young lived their adolescence days of the former regime (1979-2003) from going to brothels researcher found that 920 people and 92% had gone to the house to practice adultery and that 70 of them, and by 7% had engaged in masturbation only and that 10 of them have not committed anything noteworthy and by 1% They have maintained themselves. It found that there are a lot of crimes reticent by the media because of the social values and traditions
The fetal heart rate (FHR) signal processing based on Artificial Neural Networks (ANN),Fuzzy Logic (FL) and frequency domain Discrete Wavelet Transform(DWT) were analysis in order to perform automatic analysis using personal computers. Cardiotocography (CTG) is a primary biophysical method of fetal monitoring. The assessment of the printed CTG traces was based on the visual analysis of patterns that describing the variability of fetal heart rate signal. Fetal heart rate data of pregnant women with pregnancy between 38 and 40 weeks of gestation were studied. The first stage in the system was to convert the cardiotocograghy (CTG) tracing in to digital series so that the system can be analyzed ,while the second stage ,the FHR time series was t
... Show More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
... Show MorePermanent deformation (rutting) of asphalt mixtures is one of the major forms of distress. Aggregate gradation is one of the most important factors affecting the permanent deformation of asphalt mixtures. Other variables are also important to understand their effects on the mixture such as temperature, binder content and compaction level. For this purpose 6 different aggregate gradations have been chosen and each one of them has been manufactured / tested with different variables. The results showed that at relatively low temperature there is little effect of aggregate packing on the permanent deformation. However, as the temperature increases the effect of gradation becomes apparent, in that the better the packing the better the resistance
... Show MoreBending effects on the transmission of optical signal are investigated on a single mode
optical fiber (SMOF) of 10 m length, core radius of 5 μm and optical refractive index difference
0.003. The bending radii (R) were between 0.08 and 0.0015 m. A great decrease in the amplitude is
shown for radii below 0.01 m. Sudden break down occurs for radii less than 0.0015 m. Birefringence
(B) is difficult to measure for long fibers. Meanwhile, B was found by comparing with calibrated
fiber of the same properties but of length of 0.075 m. The results show an increase in propagation
constant (Δβ) and the decrease in beat length (Lb), and show that bending decreases the critical radius
of curvature (Rc) related to B. The chang
. The concepts of structural flexibility became one of the important goals in the design phases to reach high performance in architecture. The pioneering projects and ideas that linked architecture with technologies and scientific innovations appeared, with the aim of reaching projects that mix the concepts of flexibility with the development of machine thought and modern technology to meet the functional, environmental, and aesthetic requirements for human wellbeing. The aim of this paper is to identify the mechanisms used in order to reach flexible structural systems capable of accommodating technological changes and developments. The research hypothesizes that the structural design according to the concepts of flexibility achieves high s
... Show MoreThe quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.
FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic
... Show MoreThis study examined the effects of water scarcity on rural household economy in El Fashir Rural Council / North Darfur State- western Sudan. Both quantitative and qualitative methods were used as to get a deeper understanding of the impact of water scarcity on the rural house economy in the study area. 174 households out of 2017 were selected from 45 villages which were distributed in eight village councils forming the study area. Statistical methods were used to manipulate the data of the study. The obtained results revealed that water scarcity negatively affected the rural household economy in the study area in many features. These include the followings: much family efforts and time were directed to fetch for water consequentl
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More