Preferred Language
Articles
/
jperc-162
Family violence, its causes and effects on society (women and children)
...Show More Authors

Summary of the research Family violence, its causes and effects on society (women and children). Search Goal: The current research aims to identify: 1. Causes of family and social violence (for children and women). 2. How to process. research importance : Domestic violence is a major and devastating problem that has a negative and direct impact on children in particular and women or mothers in general. The problem of domestic violence is linked to many factors and individual, social, economic, psychological and environmental variables, which makes one theory that claims to be inaccurate. It is difficult to understand the nature of family violence without linking it to some of the concepts related to it. The negative effects that may lead to the destruction of the entire family entity and the emergence of a generation of children confused and confused intellectual and behavioral. It also aims at reducing the capacities of children who are affected by education, productivity and creativity, and their future tasks and responsibilities. This will jeopardize the security and stability of society and its impact on the safety of its children, its systems, its systems and its policies, and the disruption of its races to the child's imbalance due to verbal and non-verbal abuse. Both physical and mental, whether deliberately or deliberately, and this leads to harm or destroy the system of the personality of the child specifically and women in general and the forms of domestic violence and social violence. The research presented suggestions for treatment including: 1. Work to raise awareness among the people about the importance of family stability. 2. Reducing the use of physical violence for children, especially women, in general, to try to reach other ways of punishment rather than beating and depriving them of the things that they want, but not of the basic things. 3. Work to prevent children from watching violence on satellite TV screens. 4. Remove children from work in workshops, such as car or bicycle repair shops or blacksmith shops and other works. 5. Spread awareness of violence against women and children through lectures, seminars and legislation of strict laws on this subject

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Iraqi Journal Of Agricultural Sciences 49 (4), 632-638‏
Influence of some organic fertilizers on date palm CV. Barhi
...Show More Authors

Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
The effect of different flooding ratio on Al-Shuwaija marsh
...Show More Authors

In this research, the effect of changing the flood level of Al-Shuwaija marsh was studied using the geographic information systems, specifically the QGIS program, and the STRM digital elevation model with a spatial analysis accuracy of 28 meters, was used to study the marsh. The hydraulic factors that characterize the marsh and affecting on the flooding such as the ranks of the water channels feeding the marsh and the degree of slope and flat areas in it are studied. The area of immersion water, the mean depth, and the accumulated water volume are calculated for each immersion level, thereby, this study finds the safe immersion level for this marsh was determined.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Biochemical & Cellular Archives
A COMPARATIVE STUDY ON SOME BIOCHEMICAL PARAMETERS IN INFERTILE PATIENTS.
...Show More Authors

Publication Date
Thu Oct 01 2009
Journal Name
2009 Ieee Symposium On Industrial Electronics & Applications
ITTW: T-way minimization strategy based on intersection of tuples
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Sat Feb 21 2026
Journal Name
Journal Of Engineering
Application of Mathematical Drilling Model on Southern Iraqi Oil Fields
...Show More Authors

View Publication
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Engineering
Parametric Study on Unconnected Piled Raft Foundation Using Numerical Modelling
...Show More Authors

Piled raft is commonly used as foundation for high rise buildings. The design concept of piled raft foundation is to minimize the number of piles, and to utilize the entire bearing capacity. High axial stresses are therefore, concentrated at the region of connection between the piles and raft. Recently, an alternative technique is proposed to disconnect the piles from the raft in a so called unconnected piled raft (UCPR) foundation, in which a compacted soil layer (cushion) beneath the raft, is usually introduced.  The piles of the new system are considered as reinforcement members for the subsoil rather than as structural members. In the current study, the behavior of unconnected piled rafts systems has been studie

... Show More
View Publication Preview PDF
Crossref (11)
Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
Some results on the non-zero divisor graphs of Zn
...Show More Authors

In this work, we study several features of the non-zero divisor graphs (ℵZD- graph) for the ring Zn of integer modulo n. For instance, the clique number, radius, girth, domination number, and the local clustering coefficient are determined. Furthermore, we present an algorithm that calculates the clique number and draws the non-zero divisor for the ring Zn.

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 04 2024
Journal Name
Computation
High-Performance Krawtchouk Polynomials of High Order Based on Multithreading
...Show More Authors

Orthogonal polynomials and their moments serve as pivotal elements across various fields. Discrete Krawtchouk polynomials (DKraPs) are considered a versatile family of orthogonal polynomials and are widely used in different fields such as probability theory, signal processing, digital communications, and image processing. Various recurrence algorithms have been proposed so far to address the challenge of numerical instability for large values of orders and signal sizes. The computation of DKraP coefficients was typically computed using sequential algorithms, which are computationally extensive for large order values and polynomial sizes. To this end, this paper introduces a computationally efficient solution that utilizes the parall

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref