Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order to raise community awareness of the dangers of these crimes and their dimensions and manifestations that are still under study and research and digital exploration and statistical especially states that characterized Banglagaha prolonged contact of the world , making it more vulnerable to such crimes characterized by a high degree of organization , precision and uncertainty for large segments of individuals , specifically in the Iraqi society , The importance of this study lies in its search optimization for this phenomenon, and the legacy of a great vacuum in punitive legal aspect to criminalize this type of crime, which requires us a quick review of all laws that seek to curb cyber crime, whether at the international, regional or Arab or national through a modification and change, so in line with the new reality
The consisting of four topics to study in answer focused on some questions including: What are the cyber crimes, and what are the kinds of characteristics, and what are the difficulties that could face means control at the international level and Aarabiy and local, and what are the risks to various private groups in society, the kids category 1. The study has concluded that these crimes notifier great on all members of the community, especially children.
2. It threatens Social Security is not only the local and national community, but that the risks and penetrate beyond the territorial and national and international borders.
3. Azert results that traditional laws and new laws still do not rise to the level of combating this type of crime, and need more studies with to find the kind of coordination and cooperation with various countries to track crimes that carry the trait and the nature of the laws that could criminalize the perpetrators real quest.
4.Azart study that this type of crime suffered material losses and moral expensive process threatens the advancement of society and its development in the long run, particularly with regard to terrorism and the exploitation of children in this type of crime offenses.
The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.
In this, search the comparison between binary lo
... Show MoreTwisted tape insertion in the smooth plain tube is one of the types of passive methods that are used to enhance heat transfer. Swirl fluid flow inside the tube and related heat transfer characteristics are very complex. ANSYS FLUENT (V 16.1) and ASPEN industrial program are used in analyzing this technique for enhancement heat transfer. A circular plain tube has length L=8534mm and 17 mm inner diameter with a twisted tape of twist ratio of y = (H/D) = (150/17) =8.8 along the plain tube were considered for this study. Eight Reynolds numbers (Re) of 784, 1000, 2000, 3000, 4000, 5000, 6000 and 7000 are used to analyze the response of thermal performance. Crude oil API 28 exit temperature, film heat transfer coefficient, Nus
... Show MoreTwisted tape insertion in smooth plain tube is one of types of passive methods that is used to enhance heat transfer. Swirl fluid flow inside tube and related heat transfer characteristics are very complex. ANSYS FLUENT (V 16.1) and ASPEN industrial program are used in analyzing this technique for enhancement heat transfer. A circular plain tube has length L=8534mm and 17 mm inner diameter with twisted tape has twist ratio of y = (H/D) = (150/17) =8.8 along with a plain tube were considered for this study. Eight Reynolds numbers (Re) of 784, 1000, 2000, 3000, 4000, 5000, 6000 and 7000 are used to analyze the response of thermal performance. Crude oil API 28 exit temperature, film heat transfer coefficient, Nusselt number
... Show MoreThere are Islamic sources and books that deal with the different doctrinal and differential framework of the Islamic religion with a monistic approach, describing them with embarrassing jurisprudential titles such as: excommunication and expiation, and epithets that carry the characteristics of hatred and rejection, in addition to removing them from the sect and religion, and the reason for that is that the doctrine (A) or (b) considers itself the doctrine that represents only the Islamic religion, and other doctrines are misguided and disbelieving. the reasons behind this - besides the attempt to establish doctrinal and fiqih rooting in claiming truth and escaping from within the foundational differential doctrinal system – is the pol
... Show MoreThe research statement to the amount of the contribution of information and communication technology in the quality of tourism and hotel services, and determine the relationship between the impact of information and communication and the quality of tourism services technology, The importance of the research is to establish the philosophical thinking of the nature of variables, as a modern administrative terminology and employ them towards the quality of tourism and hotel services, the research dealt with a problem expressed by a number of intellectual and practical questions, Was formulated based on the current situation witnessed by the tourism sector and hotel in Iraq, and the real gap was the lack of awareness of the impo
... Show MoreThe aim of this study is to know the effect of different percentages of chitosan added to drinking water on the weight and quality of quail meat, physical anatomy in terms of (the body of the long carcass, the girth of the chest, the length of the thigh bones, the thigh racket, the fullness of the chest), chemical analysis (protein, moisture, fat and ash) and sensory evaluation of quail meat. It was purchased 320 Iraqi-origin birds of quail and one day old. Chicks were randomly distributed to three equal groups' treatments and treated with chitosan and added to the drinking water: the first treatment (0.1 gm./L water only as a control treatment), the second treatment (0.2 gm./L of chitosan was added to the drinking water) and the
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreAbstract
Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built t
... Show MoreThe trade balance is considered as a way to join the national economy with the world, So it is the mirror that reflect the economic center of the country and it is point to competitive ability of it, The tariff and the exchange rate perform a great role to motivate the domestic production and improve the trade balance if we direct them to achieve the same purpose. The Iraqi economic has trade balance which achieve overabundant during the years of studying because of the oil exports, while the other exports represent a small percentage it is hardly remember, and expansion in imports from other side causes exhaustion in oil revenues, and this make the trade balance in permanent
... Show MoreMany designs have been suggested for unipolar magnetic lenses based on changing the width of the inner bore and fixing the other geometrical parameters of the lens to improve the performance of unipolar magnetic lenses. The investigation of a study of each design included the calculation of its axial magnetic field the magnetization of the lens in addition to the magnetic flux density using the Finite Element Method (FEM) the Magnetic Electron Lenses Operation (MELOP) program version 1 at three different values of current density (6,4,2 A/mm2). As a result, the clearest values and behaviors were obtained at current density (2 A/mm2). it was found that the best magnetizing properties, the high
... Show More