The aim of this study to investigate the sexual harassment, prevention strategies, and the appropriate ways that tackle this phenomena. The current research consisted of four chapter; the first chapter gave a general introduction about the targeted topic followed by the problem of statement, the significance of study, study’s aims, and end with the limitations of study. The second section of chapter one referred to the common concepts of study. Third section addressed the previous studies that related to the current one. Chapter two concerned with the sexual violence against minors. It has four section; first section addressed number of concepts which related to sexual violence. The second section focused on the implications of sexual violence and harassment. Third section presented the prospective of sociology toward sexual violence and harassment (family disintegration, breaking up and the post-trauma disorders, violence against minors, child trafficking as one of the serious challenges during childhood, and the effect of sexual violence and harassment on society). The third chapter revealed the Islamic law’s prospective of sexual anomalies and sexual violence, How parents prevent minors from sexual violence, the role of parents when the harassment occurs, how to promote the protective and preventive measures, the using of appropriate techniques to prevent minors against sexual violence, united nation’ rules of sexual violence, united nation’s role of making ultimate strategies of sexual violence, and finally, he put forward some recommendations and suggestions.
Background : Although development and progress in various diagnostic methods, but still identification of remnants of skeletal and decomposing parts of human is one of the most difficult skills in forensic medicine . Gender and age estimation is also considering an important problem in the identification of unknown skull. The aims of study: To estimate volume and dimension of maxillary sinus in individuals with dentate and edentulous maxillae using CT scan, and to correlate the maxillary sinus volume in relation to gender and age. Materials and Methods : This study included 120 patients ranged from (40-69 years), divided into two groups, dentate group with fully dentate maxilla and edentulous group with complete edentulous maxilla, and e
... Show MoreThe multi-dentate Schiff base ligand (H2L), where H2L=2,2'-(((1,3,5,6)-1-(3-((l1-oxidaneyl)-l5-methyl)-4-hydroxyphenyl)-7-(4-hydroxy-3-methoxyphenyl)hepta-1,6-di ene-3,5-diylidene)bis(azaneylylidene))bis(3-(4-hydroxyphenyl)propanoic acid), has been prepared from curcumin and L- Tyrosine amino acid. The synthesized Schiff base ligand (H2L) and the second ligand 1,10-phenanthroline (phen) are used to prepare the new complexes [Al(L)(phen)]Cl, K[Ag(L)(phen)] and [Pb(L)(phen)]. The synthesized compounds are characterized by magnetic susceptibility measurements, micro elemental analysis (C.H.N), mass spectrometry, molar conductance, FT-infrared, UV-visible, atomic absorption (AA), 13C-NMR, and 1H-NMR spectral studies. The characterization of the
... Show MoreThe objective of the study: To diagnose the reality of the relationship between the fluctuations in world oil prices and their reflection on the trends of government spending on the various economic sectors.
The research found: that public expenditures contribute to the increase of national consumption through the purchase of consumer goods by the state for the performance of the state's duties or the payment of wages to employees in the public sector and thus have a direct impact on national consumption
The results of the standard tests showed that there is no common integration between the oil price fluctuations and the government expenditure on the security sector through the A
... Show Moreحضرت معقدات كل من الفنادايل, الخارصين, النحاس والكادميوم بتكافؤهم الثنائي والذهب بتكافؤه الثلاثي بأستخدام صبغة ازوجديدة (6،4،2-ثلاثي هيدروكسي-3-((3-هيدروكسي فنيل) ثنائي زينيل ) فنيل ) ايثان-1-اون المحضرة من ملح الديازونيوم مع ٦,٤,٢- ثلاثي هيدروكسي اسيتوفينون بعد عزل (E)-1-(2,4,6-trihydroxy-3-((3-hydroxyphenyl)diazenyl)phenyl)ethan-1-one تم تشخيصها بواسطة الطرق الطيفية المتاحة والتقنيات التشخيصية لكل من التحليل الدقيق للعناصرواطياف كل من ال
... Show More<p><strong>Objective: </strong>The aim of our study was to compare between flavonoids and phenolic acids contents of leaves and fruits of <em>Melia azedarach</em> since no phytochemical investigation had done previously in Iraq.</p><p><strong>Methods: </strong>The leaves and fruits of <em>Melia azedarach </em>were extracted by soxhlet using 80% ethanol then the dried extract was suspended in water and fractionated using petroleum ether, chloroform, ethyl acetate, and n-butanol. The n-butanol fraction was hydrolyzed by acid and partitioned with ethyl acetate. The different fractions containing flavonoids and phenolic acids were analyzed by HPLC and HPTLC.</p><
... Show MoreObjective of the study was to rate and analyze the physical fitness of female students from Iraq and Russia to find similarities, differences and regularities. Sampled for the study were 44 female non-sporting students: 20 students from Pedagogical University in Bagdad; and 24 students from Russian State University of Physical Education, Sport, Youth and Tourism in Moscow. The study was designed to obtain the joints flexibility, coordination, speed-strength and static endurance rates. The Iraqi students were tested with higher coordination abilities than their Russian peers, whilst the latter were ranked higher in the speed-strength, shoulder joints and spine flexibility tests, albeit lower than their Iraqi peers in the hip flexibility test
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show Moreأن السياسة النقدية في العراق لم تشهد تحسناً كبيراً في دورها المطلوب
منها، وهذا يعود الى جملة من التغيرات على أدائها ودورها في التأثير على المتغيرات الأقتصادية المهمة، اذ حصلت ظروف صعبة على المستوى السياسي والأقتصادي اسهمت في أضعاف دورها في العراق. فالحروب العسكرية الثلاثة في وقت قياسي دمرت البنى التحتية للأقتصاد العراقي، وأخرت عملية التنمية الأقتصادية والبشرية لعدة عقود بسبب الأستنزاف الكبير للمو
The preferred route of drug administration is the oral route, but drugs with narrow absorption window in the gastrointestinal tract are still challenging. The ability to extend and monitor the gastric emptying time is a valuable tool for processes remaining in the stomach longer than other traditional dosage forms.
The purpose of this study was to formulate and evaluate gastroretentive superporous hydrogel (SPH) of carvedilol with view to improve its solubility and increase gastric residence time in order to get sustained release formulas via utilization of various kinds and concentrations of hydrophilic polymers then after, incorporate the best prepared formula into capsules.
Sixteenth formulae of SPH h
... Show More