Summary of the research Family violence, its causes and effects on society (women and children). Search Goal: The current research aims to identify: 1. Causes of family and social violence (for children and women). 2. How to process. research importance : Domestic violence is a major and devastating problem that has a negative and direct impact on children in particular and women or mothers in general. The problem of domestic violence is linked to many factors and individual, social, economic, psychological and environmental variables, which makes one theory that claims to be inaccurate. It is difficult to understand the nature of family violence without linking it to some of the concepts related to it. The negative effects that may lead to the destruction of the entire family entity and the emergence of a generation of children confused and confused intellectual and behavioral. It also aims at reducing the capacities of children who are affected by education, productivity and creativity, and their future tasks and responsibilities. This will jeopardize the security and stability of society and its impact on the safety of its children, its systems, its systems and its policies, and the disruption of its races to the child's imbalance due to verbal and non-verbal abuse. Both physical and mental, whether deliberately or deliberately, and this leads to harm or destroy the system of the personality of the child specifically and women in general and the forms of domestic violence and social violence. The research presented suggestions for treatment including: 1. Work to raise awareness among the people about the importance of family stability. 2. Reducing the use of physical violence for children, especially women, in general, to try to reach other ways of punishment rather than beating and depriving them of the things that they want, but not of the basic things. 3. Work to prevent children from watching violence on satellite TV screens. 4. Remove children from work in workshops, such as car or bicycle repair shops or blacksmith shops and other works. 5. Spread awareness of violence against women and children through lectures, seminars and legislation of strict laws on this subject
n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show MoreThe applications of Multilevel Converter (MLC) are increased because of the huge demand for clean power; especially these types of converters are compatible with the renewable energy sources. In addition, these new types of converters have the capability of high voltage and high power operation. A Nine-level converter in three modes of implementation; Diode Clamped-MLC (DC-MLC), Capacitor Clamped-MLC (CC-MLC), and the Modular Structured-MLC (MS-MLC) are analyzed and simulated in this paper. Various types of Multicarrier Modulation Techniques (MMTs) (Level shifted (LS), and Phase shifted (PS)) are used for operating the proposed Nine level - MLCs. Matlab/Simulink environment is used for the simulation, extracting, and ana
... Show Moreيهدف البحث الى دراسة وتحليل الهندسة المتزامنة (CE) وتحسين التكلفة(CO)، واستعمال مخرجات الهندسة المتزامنة كمدخلات لتحسين التكلفة، وبيان دور الهندسة المتزامنة في تحسين جودة المنتوج، وتحقيق وفورات في وقت التصميم والتصنيع والتجميع وتخفيض التكاليف، فضلاً عن توظيف بعض النماذج لتحديد مقدار الوفورات في الوقت ومنها نموذج(Lexmark) ونموذج (Pert) لتحديد الوفورات في وقت التصميم وقت لتصنيع والتجميع. ولتحقيق اهداف
... Show MoreThe expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreThis investigation was carried out to study the treatment and recycling of wastewater in the Battery industry for an effluent containing lead ion. The reuse of such effluent can only be made possible by appropriate treatment method such as electro coagulation.
The electrochemical process, which uses a cell comprised aluminum electrode as anode and stainless steel electrode as cathode was applied to simulated wastewater containing lead ion in concentration 30 – 120 mg/l, at different operational conditions such as current density 0.4-1.2 mA/cm2, pH 6 -10 , and time 10 - 180 minute.
The results showed that the best operating conditions for complete lead removal (100%) at maximum concentration 120 mg/l was found to be 1.2 mA/cm2 cur
New series of 2-mecapto benzoxazole derivatives (1-20) incorporated into fused to different nitrogen and suphur containing heterocyclic were prepared from 2-meracpto benzoxazole, when treated with hydrazine hydrate to afford 2-hydrazino benzoxazol (1). Compound (1) converted to a variety of pyridazinone andphthalazinone derivatives (2-4) by reaction with different carboxylic anhydride. Also, reaction of (1) with phenyl isothiocyanate and ethyl chloro acetate afforded 3-phenyl-1,3-thiazolidin-2,4-dione-2-(benzoxazole-2-yl-hydrazone) (6). Azomethines (7-10) were prepared through reaction of (1) with aromatic aldehyde, then (7, 8) converted to thaizolidinone derivatives (11, 12). Treatment of (1) with active methylene compounds afforded deriva
... Show MoreThe current research dealt with the presence of ornaments and jewelry since ancient times، which express the social، religious or emotional status of the person who adorns them، in addition to being distinguished by a distinct aesthetic and luxury، that is، in a sense closely related to the social and economic status of people، and we note that jewelry is considered a symbol of luxury and luxury، and hence The need to study luxury appeared in the design of ornaments and jewelry because it refers to the adornment elements that are made of metals and precious stones، which actually indicate signs of status or position that distinguish social classes from each other. The problem was identified by the following question: Determine th
... Show MoreThe issue of increasing the range covered by a wireless sensor network with restricted sensors is addressed utilizing improved CS employing the PSO algorithm and opposition-based learning (ICS-PSO-OBL). At first, the iteration is carried out by updating the old solution dimension by dimension to achieve independent updating across the dimensions in the high-dimensional optimization problem. The PSO operator is then incorporated to lessen the preference random walk stage's imbalance between exploration and exploitation ability. Exceptional individuals are selected from the population using OBL to boost the chance of finding the optimal solution based on the fitness value. The ICS-PSO-OBL is used to maximize coverage in WSN by converting r
... Show More