The aim of this study to investigate the sexual harassment, prevention strategies, and the appropriate ways that tackle this phenomena. The current research consisted of four chapter; the first chapter gave a general introduction about the targeted topic followed by the problem of statement, the significance of study, study’s aims, and end with the limitations of study. The second section of chapter one referred to the common concepts of study. Third section addressed the previous studies that related to the current one. Chapter two concerned with the sexual violence against minors. It has four section; first section addressed number of concepts which related to sexual violence. The second section focused on the implications of sexual violence and harassment. Third section presented the prospective of sociology toward sexual violence and harassment (family disintegration, breaking up and the post-trauma disorders, violence against minors, child trafficking as one of the serious challenges during childhood, and the effect of sexual violence and harassment on society). The third chapter revealed the Islamic law’s prospective of sexual anomalies and sexual violence, How parents prevent minors from sexual violence, the role of parents when the harassment occurs, how to promote the protective and preventive measures, the using of appropriate techniques to prevent minors against sexual violence, united nation’ rules of sexual violence, united nation’s role of making ultimate strategies of sexual violence, and finally, he put forward some recommendations and suggestions.
Video represented by a large number of frames synchronized with audio making video saving requires more storage, it's delivery slower, and computation cost expensive. Video summarization provides entire video information in minimum amount of time. This paper proposes static and dynamic video summarization
methods. The proposed static video summarization method includes several steps which are extracting frames from video, keyframes selection, feature extraction and description, and matching feature descriptor with bag of visual words, and finally save frames when features matched. The proposed dynamic video summarization
method includes in general extracting audio from video, calculating audio features
Throughout this paper, T is a ring with identity and F is a unitary left module over T. This paper study the relation between semihollow-lifting modules and semiprojective covers. proposition 5 shows that If T is semihollow-lifting, then every semilocal T-module has semiprojective cover. Also, give a condition under which a quotient of a semihollow-lifting module having a semiprojective cover. proposition 2 shows that if K is a projective module. K is semihollow-lifting if and only if For every submodule A of K with K/( A) is hollow, then K/( A) has a semiprojective cover.
The unbalanced distribution of investments in the economic fields of the 1950s had a negative impact on the overall economic life of the country in that period and subsequent periods. Since the 1960s, the planning agencies have tried to reduce the negative impact of imbalance in regional development and the emergence of disparities in development between the regions of the country and to identify disparities in levels of spatial development. At the planning level, there have been many studies and mathematical and statistical models to analyze variance and clarify its dimensions and to measure the degree of developmental disparity between Regions and means of narrowing this problem and the development of policies and strategies for develo
... Show MoreLet
be an
module,
be a fuzzy soft module over
, and
be a fuzzy soft ring over
, then
is called FSFS module if and only if
is an
module. In this paper, we introduce the concept of
Noetherian and
Artinian modules and finally we investigate some basic properties of
Noetherian and
Artinian modules.
The main aim of this research is to present and to study several basic characteristics of the idea of FI-extending semimodules. The semimodule is said to be an FI-extending semimodule if each fully invariant subsemimodule of is essential in direct summand of . The behavior of the FI-extending semimodule with respect to direct summands as well as the direct sum is considered. In addition, the relationship between the singularity and FI-extending semimodule has been studied and investigated. Finally extending propertywhich is stronger than FI extending, that has some results related to FI-extending and singularity is also investigated.
It has become familiar to see alchemy as a methodological approach that combines conscious, diverse, psychological, social, structural, and discrete approaches in the communications technology that Marshall McLuhan found to be able to extend our bodies and senses, The media discourse has a deep and superficial structure produced by the first, with its social, cultural and historical backgrounds, in a context that connects the image with the word, as the "meanings are made" - everywhere, as described by Jonathan ) In fashion, in the arts as a whole, and from its "signs" Our analysis of «meaning», in the media, and communication through advertising, magazines, newspapers, television, and the Internet. Therefore, alchemy is preoccupied wi
... Show MoreThe current research seeks to shed light on the role that social media can play, through the optimal use of it by students, in achieving academic excellence. The most prominent aims that constitute it are:Identifying the social sites most used by students; learning how students interact with the published study material on communication sites and benefit from them to achieve their academic excellence; and knowing the connection between using social media and achieving academic excellence, and the role that these sites play in achieving academic excellence.That incorrect use by students leads to adverse results, and thus affects their academic level. Failure of parents to monitor their student’ use of social media leads
... Show MoreBlock cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block
... Show More