Abstract
Disturbs the social system in any society specially in Iraq other than
other Islamic and Arabic countries. That is according to the abnormal
conditions that Iraq has past through as wars and blockage, and lastly the
invasion. Therefore it has been necessary to put this phenomenon under
study and analysis to discover Juvenile Delinquency is one of the most
prominent social phenomenon that the important reasons behind it, and trying
to treat what can be treated of the effects of it upon society.
This study is mainly concerned with the explaining the social factors
leading toward juvenile delinquency trying to crystallize the problem of the
study in the following question: (What are the psychological, social,
economical factors leading toward juvenile delinquency?)
The study aims at recognizing the order of the different factors of
juvenile delinquency and knowing the effect of the social factors on it, in
addition to the family factors affecting the delinquency.
The importance of the study comes from the importance of the
phenomenon itself. The study identifies the social factors resulting in the
delinquency of the juvenile. It is important, for it shows the main family factors
in all its different sides resulting in the behaviour of the juvenile. The study
tries to put the scales to treat the phenomenon.
In its theoretical frame, the study has discussed the phenomenon of
juvenile delinquency and the factors behind it.
The researcher has showed several former studies in the same field
that have focused on the most important factors affecting the appearance of
the phenomenon.
Quantitative real-time Polymerase Chain Reaction (RT-qPCR) has become a valuable molecular technique in biomedical research. The selection of suitable endogenous reference genes is necessary for normalization of target gene expression in RT-qPCR experiments. The aim of this study was to determine the suitability of each 18S rRNA and ACTB as internal control genes for normalization of RT-qPCR data in some human cell lines transfected with small interfering RNA (siRNA). Four cancer cell lines including MCF-7, T47D, MDA-MB-231 and Hela cells along with HEK293 representing an embryonic cell line were depleted of E2F6 using siRNA specific for E2F6 compared to negative control cells, which were transfected with siRNA not specific for any gene. Us
... Show MoreThe effect of using different R -molar ratio under variable reaction conditions (acidic as well as basic environment and reaction temperature) have been studied. The overall experiments are driven with open and closed systems. The study shows that there is an optimum value for a minimum gelling time at R equal 2. The gelling time for all studied open system found to be shorter than in closed system. In acidic environment and when R value increased from 2 to 10, the gelling time of closed systems has increased four times than open systems at T=30 ?C and fourteen times when temperature reaction increased to 60 ?C. While in basic environment the influence of increasing R value was limited.
Introduction: Although it is discouraged, community pharmacy customers can obtain oral corticosteroids (OCSs) without prescriptions from some community pharmacies in Iraq. Medication abuse is defined as the use of medication for non-medical reasons. Objectives: The study aimed to determine demographics, beliefs, and perceptions associated with the abuse of oral corticosteroids for non-illness reasons among community pharmacy customers. Methods: This cross-sectional study was conducted in fall 2018 in four provinces in Iraq. Customers of 19 community pharmacies asking for OCSs for themselves without a prescription were administered a paper survey. This study used the Theory of Reasoned Action (TRA) to measure the relation
... Show MoreThe present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire
... Show MoreThe research aims to achieve market share requirements and reach the targeted competitive price through the application of management accounting techniques represented by continuous improvement technique and target costing under an Activity Based Cost (ABC) system and Activity Based Management (ABM), In Muthanna Cement Company to reach the rationalization of the cost of the product and maintain the required quality and improve the profitability of the company.
The problem of research has emerged in the inability of local firms to enter into effective competition with other companies operating in the same economic sector, Because of the high cost of its products, Which led to the sale of the product at prices below its cost, and t
... Show MoreThis article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t
... Show MoreAbstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show MoreGlobally, buildings use about 40% of energy. Many elements, such as the physical properties of the structure, the efficiency of the cooling and heating systems, the activity of the occupants, and the building’s sustainability, affect the energy consumption of a building. It is really difficult to predict how much energy a building will need. To improve the building’s sustainability and create sustainable energy sources to reduce carbon dioxide emissions from fossil fuel combustion, estimating the building's energy use is necessary. This paper explains the energy consumed in the lecture building of the Al-Khwarizmi College of Engineering, University of Baghdad (UOB), Baghdad, Iraq. The weather data and the building construction informati
... Show More