In view of the large profits made by the sex trade on the one hand, and the minor penalties imposed on the traffickers (brokers) compared with the severe penalties imposed on the drug trade and illegal weapons, on the other hand, this trade has become popular and spread in most countries of the world, and the cornerstones of this trade and A safe haven for them is hotels, especially luxury ones with international brands where their guests are rich and some may look for sex for money. Given the great physical and psychological damage to the victims, this research highlights the civil liability of hotels towards these victims in US and Iraqi law.In order not to limit the scope of the researcher theoretically, we have supported a number of cases that were presented to the US judiciary exclusively for the absence of such cases before the Iraqi judiciary (as we know). In conclusion, we have reached a number of conclusions and recommendations that we wish the Iraqi legislator to adopt
Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show MoreThis study includes the application of non-parametric methods in estimating the conditional survival function of the Beran method using both the Nadaraya-Waston and the Priestley-chao weights and using data for Interval censored and Right censored of breast cancer and two types of treatment, Chemotherapy and radiation therapy Considering age is continuous variable, through using (MATLAB) use of the (MSE) To compare weights The results showed a superior weight (Nadaraya-Waston) in estimating the survival function and condition of Both for chemotherapy and radiation therapy.
Nanoencapsulation, employing safe materials, holds substantial promise for enhancing bioactive compounds’ delivery, stability, and bioactivity. In this study, we present an innovative and safe methodology for augmenting the incorporation of the anticancer agent, curcumin, thereby inducing apoptosis by downregulating miR20a and miR21 expression. Our established methodology introduces three pivotal elements that, to our knowledge, have not undergone formal validation: (1) Novel formulation: We introduce a unique formula for curcumin incorporation. (2) Biocompatibility and biodegradability: our formulation exclusively consists of biocompatible and biodegradable constituents, ensuring t
We have chosen the subject of the research (the letters at Ibn Jinnie in the lexicon of the tongue of the Arabs) in order to know the opinion of Ibn Jinnie in this range of words and compare them with the opinions of scientists who preceded him to know the personality of this linguistic world.
Objective: The aim of this study is to determine the role of spiral Computerized Tomography in the diagnosis and
detection the types of stroke.
Methodology: One hundred sixty two patients (162) (99 males and 63 females) their ages ranging from (13 – 80)
year, all of them are suffering from stroke. They were collected randomly from spiral Computerized Tomography
unit in Baquba Teaching hospital during the period from November / 2010 to December / 2011 .All the patients
were examined clinically and then done spiral Computerized Tomography examination.
Results : The results of this study showed that the stroke effected different age groups and both sex but males is
more affected than the females .The results of spiral
The aim of the research is to determine the impact of evaluation of investment projects after the preparation of investment budgets taking into consideration within the investment budgets the concept of competitive strategy, as the harmony between the preparation of investment budgets and competitive strategy will contribute to the success of economic unity and achieve profits well and achieve a competitive advantage. Strategies for economic units because the most important factor to them is the costs produced and the progress of the research problem is focused on "Is it possible to include a strategy of competition, especially within the investment budget when prepared The study concluded that the investment plan prepared by the
... Show MoreThe study aimed to identification the effect of brainstorming in linguistically grow of garten child the sample of study is composed from (48)male and female children have been distributed for two groups,one of them is experimental and another is disciplined for every per of garten and pre education,and they have been awarded in a number of variations. For measuring the subordinate variation(linguistically grow)the researcher prepared ascale for this purpose that consist of two parts:the first part the scale of linguistically grow of garten child(4-5 years)and the second part the scale of linguistically grow of pre education child (5-6 years).Consist of every one from (20)shapes of linguistically grow shapes for garten chil
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More