The aim of this study to investigate the sexual harassment, prevention strategies, and the appropriate ways that tackle this phenomena. The current research consisted of four chapter; the first chapter gave a general introduction about the targeted topic followed by the problem of statement, the significance of study, study’s aims, and end with the limitations of study. The second section of chapter one referred to the common concepts of study. Third section addressed the previous studies that related to the current one. Chapter two concerned with the sexual violence against minors. It has four section; first section addressed number of concepts which related to sexual violence. The second section focused on the implications of sexual violence and harassment. Third section presented the prospective of sociology toward sexual violence and harassment (family disintegration, breaking up and the post-trauma disorders, violence against minors, child trafficking as one of the serious challenges during childhood, and the effect of sexual violence and harassment on society). The third chapter revealed the Islamic law’s prospective of sexual anomalies and sexual violence, How parents prevent minors from sexual violence, the role of parents when the harassment occurs, how to promote the protective and preventive measures, the using of appropriate techniques to prevent minors against sexual violence, united nation’ rules of sexual violence, united nation’s role of making ultimate strategies of sexual violence, and finally, he put forward some recommendations and suggestions.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreFive levels of Zn-EDTA fertilizer and foliar application of boron were used to study the local rice response through studying of some vegetative and reproductive growth characters, by conducting two field experiments at Kanipanka Agricultural Research Station during the summer season of 2004 by using RCBD with three replications. Significant differences were found in studied characters, there were increase in the number of days from seeding to 50% flowering (94.330-96.233) days, from 50% flowering to physiological maturity (37.50-38.28) days, plant height (82.50-91.423) cm and LAI (5.441-7.525). Reproductive characters such as number of grains panicle-1 (74.11-85.88), number of panicles m-2 (321.00-426.083), biological yield (8166.166-11082
... Show MoreProposals to raise awareness of the rights of minorities and secure their freedoms have begun to receive attention Internationally. It is escalated, especially after the increasing impact of wars and conflicts on these situations Minorities, and UNESCO stresses the need to take over information and communication policies Greater attention to protect minority rights.
Hence the importance of our research, the problem of which lies in the main question: (What is the role Radio Republic of Iraq has played in promoting awareness of minority rights at the level : Public and Social?) . As one of the Iraqi media networks , laws oblige them to pay attention to the rights of minorities and to spread a culture of pluralism , diversity
... Show More
Diyala River is one of the important rivers that provide water for the Governorate of Diyala. In this research, the morphology and sediment transport of this river were studied using HEC-Ras software. The selected length of the river in the present study is 193 km and extended from Diyala Weir to the confluence of Tigris River and Diyala River. The fieldwork period extended from June 2020 till August 2020, where suspended-load and bed-load samples were collected and surveyed some cross-sections. The one-dimensional sediment transport model has been calibrated for five years, from 2014 to 2019. The results were compared with the measured cross-sections in 2019, and the suitable value of (maximum depth
... Show MoreEmbedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
India is today the largest democratic state in the Third World and has been able to maintain its national unity in the near future. The history of Indian civilization is more than 5,000 years old. It has achieved its heritage, culture, philosophy, traditions, national unity and unity and has taken its place among nations seeking progress and progress. Which are still visible to the present day, because of their history of civilization and achievements, and the fusion of cultures of invading peoples over the centuries with the culture of diverse Indian society, but despite being a secular state, Has put into place through its governments various forms of exclusion and marginalization towards the people of India, especially Muslims, and th
... Show MoreIn probability theory generalizing distribution is an important area. Several distributions are inappropriate for data modeling, either symmetrical, semi-symmetrical, or heavily skewed. In this paper, a new compound distribution with four parameters called Marshall Olkin Marshall Olkin Weibull (MOMOWe) is introduced. Several important statistical properties of new distribution were studied and examined. The estimation of unknown four parameters was carried out according to the maximum likelihood estimation method. The flexibility of MOMOWe distribution is demonstrated by the adoption of two real datasets (semi-symmetric and right-skewed) with different information fitting criteria. Su
This study shows impoliteness as a form of face-threatening that can be intentionally caused by verbal threats in a particular setting. It investigates: what strategies and mitigators do Iraqi-Kurdish English as a foreign language (EFL) learners use in situations of threat responses? The present investigation paper aims to examine impoliteness strategies and mitigators by these learners when they respond to threatening situations in their context. Thus, it fills a gap in pragmatics literature by investigating the reactions to threats in an Iraqi-Kurdish EFL context. To this end, 50 participants have participated in this study. An open-ended questionnaire in the form of a Discourse Completion Task (DCT) is used to elicit responses fr
... Show MoreGiving advice refers to an attempt by the speaker to express what the addressee should do in a particular situation or what is good for him/her. It is also a feature of making social relations and communications move smoothly and become stronger. The current study aims to investigate the strategies of the speech act of advice by old females and males for the younger generation in written signs. Comparison is made between old females and males regarding their pragmatic use of advice and the way they are manifested in expressing gender identity differences. The sample of the study consists of (30) written signs of advice divided equally between the two gender groups. Hinkel’s (1997) classification of the strategies for perceiving th
... Show MoreAbstract* Backgrounds The retention of the maxillary complete denture may be influenced by adequate recording in the patient’s mouth, marking, and carving of the post-dam on the maxillary cast. Failure to do so may lead to loss of retention. Successful denture construction with patient’s comfort could be achieved by effective methods of recording, marking, and carving of the post-dam. The aim of the study was to assess Iraqi dentists in their knowledge and application of the post-dam in maxillary complete dentures. Methods Questionnaires were distributed randomly through online Google Forms and 118 Iraqi dentists with different academic degree participated in the study. A multinomial logistic regression model was also used to ass
... Show More