Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order to raise community awareness of the dangers of these crimes and their dimensions and manifestations that are still under study and research and digital exploration and statistical especially states that characterized Banglagaha prolonged contact of the world , making it more vulnerable to such crimes characterized by a high degree of organization , precision and uncertainty for large segments of individuals , specifically in the Iraqi society , The importance of this study lies in its search optimization for this phenomenon, and the legacy of a great vacuum in punitive legal aspect to criminalize this type of crime, which requires us a quick review of all laws that seek to curb cyber crime, whether at the international, regional or Arab or national through a modification and change, so in line with the new reality
The consisting of four topics to study in answer focused on some questions including: What are the cyber crimes, and what are the kinds of characteristics, and what are the difficulties that could face means control at the international level and Aarabiy and local, and what are the risks to various private groups in society, the kids category 1. The study has concluded that these crimes notifier great on all members of the community, especially children.
2. It threatens Social Security is not only the local and national community, but that the risks and penetrate beyond the territorial and national and international borders.
3. Azert results that traditional laws and new laws still do not rise to the level of combating this type of crime, and need more studies with to find the kind of coordination and cooperation with various countries to track crimes that carry the trait and the nature of the laws that could criminalize the perpetrators real quest.
4.Azart study that this type of crime suffered material losses and moral expensive process threatens the advancement of society and its development in the long run, particularly with regard to terrorism and the exploitation of children in this type of crime offenses.
In this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
Relation on a set is a simple mathematical model to which many real-life data can be connected. A binary relation on a set can always be represented by a digraph. Topology on a set can be generated by binary relations on the set . In this direction, the study will consider different classical categories of topological spaces whose topology is defined by the binary relations adjacency and reachability on the vertex set of a directed graph. This paper analyses some properties of these topologies and studies the properties of closure and interior of the vertex set of subgraphs of a digraph. Further, some applications of topology generated by digraphs in the study of biological systems are cited.
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreAbstract:
the system of Administrative Control in organizations meets the need to check on the optimal use and proper resources and conservation to achieve the objectives sought by the organization, hence the system of Administrative Control is part of the overall system in any organization that has undergone evolution always to be able to keep up with progress in the development of other sciences, and that the growth of coherence between subordinates in the organization means the ability to influence the opinions, ideas and attitudes to change it for directions the organization and its values and this is reflected positively on the coherence of the organization, the researcher interest of the imp
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreEquilibrium adsorption isotherm for the removal of trifluralin from aqueous solutions using ? –alumina clay has been studied. The result shows that the isotherms were S3 according Giels classification. The effects of various experimental parameters such as contact time, adsorbent dosage, effect of pH and temperature of trifluralin on the adsorption capacities have been investigated. The adsorption isotherms were obtained by obeying freundlich adsorption isotherm with (R2 = 0.91249-0.8149). The thermodynamic parameters have been calculated by using the adsorption process at five different temperature, the values of ?H, ?G and ?S were (_1.0625) kj. mol-1, (7.628 - 7.831) kj.mol-1 and (_2.7966 - _2.9162) kg.
... Show MoreSkull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no
... Show MoreObjectives: study the relation between the effect of time (long time duration) with high concentration of iodine
and study its effect on the activity of the thyroid gland (homonal and histological changes).
Methodology: An experimental study was done on (30) albino rats (8 weeks of age) to know the effect of high
concentration of iodine on the activity of the thyroid gland aiormonal and histological changes) related with
time. The study last for six months for the period of I/2/2007 to 31/7/2007, the experiment was carried out in the
research lab. of pathology deparment, College of Medicine, University of Baghdad.
Results: The study shows changes in homonal levels of thyroid hormones (T3 & T4) and also histological<