Summary of the research Family violence, its causes and effects on society (women and children). Search Goal: The current research aims to identify: 1. Causes of family and social violence (for children and women). 2. How to process. research importance : Domestic violence is a major and devastating problem that has a negative and direct impact on children in particular and women or mothers in general. The problem of domestic violence is linked to many factors and individual, social, economic, psychological and environmental variables, which makes one theory that claims to be inaccurate. It is difficult to understand the nature of family violence without linking it to some of the concepts related to it. The negative effects that may lead to the destruction of the entire family entity and the emergence of a generation of children confused and confused intellectual and behavioral. It also aims at reducing the capacities of children who are affected by education, productivity and creativity, and their future tasks and responsibilities. This will jeopardize the security and stability of society and its impact on the safety of its children, its systems, its systems and its policies, and the disruption of its races to the child's imbalance due to verbal and non-verbal abuse. Both physical and mental, whether deliberately or deliberately, and this leads to harm or destroy the system of the personality of the child specifically and women in general and the forms of domestic violence and social violence. The research presented suggestions for treatment including: 1. Work to raise awareness among the people about the importance of family stability. 2. Reducing the use of physical violence for children, especially women, in general, to try to reach other ways of punishment rather than beating and depriving them of the things that they want, but not of the basic things. 3. Work to prevent children from watching violence on satellite TV screens. 4. Remove children from work in workshops, such as car or bicycle repair shops or blacksmith shops and other works. 5. Spread awareness of violence against women and children through lectures, seminars and legislation of strict laws on this subject
The present work aimed to study effect of (N749 & N3) dyes on TiO2 optical and electrical properties for optoelectronic application. The TiO2 paste prepared by using a doctor blade method. The samples were UV-VIS specterophometricall analyzes of TiO2 before and after immersed in dyes (N749 & N3). The results showed absorption spectra shift toward the visible region due to the adsorption of dye molecules on the surface of oxide nanoparticles. It is seen that the Eg determined to give a value of 3.3eV for TiO2 before immersing in dyes, and immersing in dyes (N749 & N3) are (1.4 &1.6 eV) respectively. The structural properties (XRD), (FTIR) and (SEM) for the sample prepared were investigated and (J-V) characteristics was stu
... Show MoreDBN Rashid, International Journal of Development in Social Sciences and Humanities, 2020
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MorePorous silicon (P-Si) has been produced in this work by photoelectrochemical (PEC) etching process. The irradiation has been achieved using diode laser of (2 W) power and 810 nm wavelength. The influence of various irradiation times on the properties of P-Si material such as P-Si layer thickness, surface aspect, pore diameter and the thickness of walls between pores as well as porosity and etching rate was investigated by depending on the scanning electron micrograph (SEM) technique and gravimetric measurements.
The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.