The research included four chapters starting with the chapter dealing with the problem of child abuse which was one of the most important educational and social problems faced by children from their parents or family members. The most common forms of abuse are physical and psychological violence. The problem of school delays is also one of the most important educational and psychological issues that concern educators, which occur because of violence and neglect of the family. The study pointed out that domestic violence is one of the issues that has started to alarm both the global and local communities, because childhood is one of the most important stages of the human development system, which is healthy in terms of physical, mental, psychological and social development. And the importance of the effects of domestic violence on the imbalance in educational achievement and the occurrence of the problem of school delays for primary school children. The aim of the research is to identify: the nature of family violence, its prevailing patterns and its causes in society, and the extent of the relationship between domestic violence and school delays in children in primary school. As well as to make some suggestions and recommendations that can contribute to reducing the phenomenon of domestic violence and get rid of the problem of school delays. The research is determined by the children of the primary stage, because this stage of the process of establishing in the two processes (educational and learning). Violence, family, family violence, child, violence against children, school delays, and late studies are also defined. The second chapter dealt with the theoretical framework dealing with forms of violence against children, psychological disorders and personality disorder, the motives of domestic violence, and studies on domestic violence and its impact on school delays. The third chapter deals with the theories of violence, the basic hypotheses of social learning theory, the theories of growth and its stages, the factors affecting scholastic achievement, and the needs of Maslow and its relationship to helping the child achieve scholastic achievement. Chapter IV examined its findings by linking the results of previous studies with theories of violence and growth. It found that domestic violence does not depend on physical harm. Psychological violence is sometimes more disruptive, leading to delays in children Primary stage. It also addressed some of the recommendations
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreThe image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o
... Show MorePassword authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.
The main purpose of this paper is to define generalized Γ-n-derivation, study and investigate some results of generalized Γ-n-derivation on prime Γ-near-ring G and
In this paper, preliminary test Shrinkage estimator have been considered for estimating the shape parameter α of pareto distribution when the scale parameter equal to the smallest loss and when a prior estimate α0 of α is available as initial value from the past experiences or from quaintance cases. The proposed estimator is shown to have a smaller mean squared error in a region around α0 when comparison with usual and existing estimators.
Fractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.