Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order to raise community awareness of the dangers of these crimes and their dimensions and manifestations that are still under study and research and digital exploration and statistical especially states that characterized Banglagaha prolonged contact of the world , making it more vulnerable to such crimes characterized by a high degree of organization , precision and uncertainty for large segments of individuals , specifically in the Iraqi society , The importance of this study lies in its search optimization for this phenomenon, and the legacy of a great vacuum in punitive legal aspect to criminalize this type of crime, which requires us a quick review of all laws that seek to curb cyber crime, whether at the international, regional or Arab or national through a modification and change, so in line with the new reality
The consisting of four topics to study in answer focused on some questions including: What are the cyber crimes, and what are the kinds of characteristics, and what are the difficulties that could face means control at the international level and Aarabiy and local, and what are the risks to various private groups in society, the kids category 1. The study has concluded that these crimes notifier great on all members of the community, especially children.
2. It threatens Social Security is not only the local and national community, but that the risks and penetrate beyond the territorial and national and international borders.
3. Azert results that traditional laws and new laws still do not rise to the level of combating this type of crime, and need more studies with to find the kind of coordination and cooperation with various countries to track crimes that carry the trait and the nature of the laws that could criminalize the perpetrators real quest.
4.Azart study that this type of crime suffered material losses and moral expensive process threatens the advancement of society and its development in the long run, particularly with regard to terrorism and the exploitation of children in this type of crime offenses.
Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreIn the present study, a pressure drop technique was used to identify the phase inversion point of oil-in-water to water-in-oil flows through a horizontal pipe and to study the effect of additives (nanoparticles, cationic surfactant and blend nanoparticles-surfactant) on the critical dispersed volume fraction (phase inversion point). The measurements were carried for mixture velocity ranges from 0.8 m/sec to 2.3 m/sec. The results showed that at low mixture velocity 0.8 and 1 m/sec there is no effect of additives and velocity on phase inversion point, while at high mixture velocities the phase inversion point for nanoparticles and blend (nanoparticles/surfactant) systems was delayed (postponed) to a higher value of the dispers
... Show MoreIn this paper, CdO nanoparticles prepared by pulsed laser deposition techniqueonto a porous silicon (PS) surface prepared by electrochemical etching of p-type silicon wafer with resistivity (1.5-4Ω.cm) in hydrofluoric (HF) acid of 20% concentration. Current density (15 mA/cm2) and etching times (20min). The films were characterized by the measurement of AFM, FTIR spectroscopy and electrical properties.
Atomic Force microscopy confirms the nanometric size.Chemical components during the electrochemical etching show on surface of PSchanges take place in the spectrum of CdO deposited PS when compared to as-anodized PS.
The electrical properties of prepared PS; namely current density-voltage charact
... Show MoreBackground: Chronic periodontitis is an inflammatory disease of tissues supporting the teeth. Salivary compositions have been most intensely studied as a potential marker for periodontal disease. In this study, analysis of saliva provides a simple and non-invasive method of evaluating the role of salivary IgA (s-IgA) levels in periodontal disease by detecting the level of (s-IgA) in patients with chronic periodontitis smokers and non smokers patients and correlate the mean (s-IgA) levels with clinical periodontal parameters Plaque index (PLI) gingival index (GI), probing pocket depth (PPD) and clinical attachment level (CAL). Materials and Methods: The study samples consists of (15) patients with chronic periodontitis who were non smokers (
... Show MoreSoft clays are generally sediments deposited by rivers, seas, or lakes. These soils are fine-grained plastic soils with appreciable clay content and are characterized by high compressibility and low shear strength. To deal with soft soil problems there is more than one method that can be used such as soil replacement, preloading, stone column, sand drains, lime stabilization and Prefabricated Vertical Drains, PVDs. A numerical modeling of PVD with vacuum pressure was analyzed to investigate the effect of this technique on the consolidation behavior of fully and different depths of partially saturated soft soils. Laboratory experiments were also conducted by using a specially-designed large consol
... Show MoreField experiment was conducted during 2007 in the experimental field of crop science Department/ Collage of Agriculture/ University of Baghdad, in order to identify the mechanism of compensation of cotton plant of Lashata Variety, with different levels of fruiting form removal in various time intervals and the effect of this factor on yield component. We use complete randomized block design with three replications. To compare the treatments: (control), 50% bud removal for one, two and three successive weeks, and 100% bud removal for one, two and three successive weeks, 50% flower removal for one, two and three successive weeks and 100% flower removal for one, two and three successive weeks, 50% boll removal for one, two and three successive
... Show MoreIn this paper, we study the incorporation of the commensalism interaction and harvesting on the Lotka–Volterra food chain model. The system provides one commensal prey, one harvested prey, and two predators. A set of preliminary results in local bifurcation analysis around each equilibrium point for the proposed model is discussed, such as saddle-node, transcritical and pitchfork. Some numerical analysis to confirm the accruing of local bifurcation is illustrated. To back up the conclusions of the mathematical study, a numerical simulation of the model is carried out with the help of the MATLAB program. It can be concluded that the system's coexistence can be achieved as long as the harvesting rate on the second prey population is
... Show More