Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order to raise community awareness of the dangers of these crimes and their dimensions and manifestations that are still under study and research and digital exploration and statistical especially states that characterized Banglagaha prolonged contact of the world , making it more vulnerable to such crimes characterized by a high degree of organization , precision and uncertainty for large segments of individuals , specifically in the Iraqi society , The importance of this study lies in its search optimization for this phenomenon, and the legacy of a great vacuum in punitive legal aspect to criminalize this type of crime, which requires us a quick review of all laws that seek to curb cyber crime, whether at the international, regional or Arab or national through a modification and change, so in line with the new reality
The consisting of four topics to study in answer focused on some questions including: What are the cyber crimes, and what are the kinds of characteristics, and what are the difficulties that could face means control at the international level and Aarabiy and local, and what are the risks to various private groups in society, the kids category 1. The study has concluded that these crimes notifier great on all members of the community, especially children.
2. It threatens Social Security is not only the local and national community, but that the risks and penetrate beyond the territorial and national and international borders.
3. Azert results that traditional laws and new laws still do not rise to the level of combating this type of crime, and need more studies with to find the kind of coordination and cooperation with various countries to track crimes that carry the trait and the nature of the laws that could criminalize the perpetrators real quest.
4.Azart study that this type of crime suffered material losses and moral expensive process threatens the advancement of society and its development in the long run, particularly with regard to terrorism and the exploitation of children in this type of crime offenses.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe research statement to the amount of the contribution of information and communication technology in the quality of tourism and hotel services, and determine the relationship between the impact of information and communication and the quality of tourism services technology, The importance of the research is to establish the philosophical thinking of the nature of variables, as a modern administrative terminology and employ them towards the quality of tourism and hotel services, the research dealt with a problem expressed by a number of intellectual and practical questions, Was formulated based on the current situation witnessed by the tourism sector and hotel in Iraq, and the real gap was the lack of awareness of the impo
... Show MoreThe trade balance is considered as a way to join the national economy with the world, So it is the mirror that reflect the economic center of the country and it is point to competitive ability of it, The tariff and the exchange rate perform a great role to motivate the domestic production and improve the trade balance if we direct them to achieve the same purpose. The Iraqi economic has trade balance which achieve overabundant during the years of studying because of the oil exports, while the other exports represent a small percentage it is hardly remember, and expansion in imports from other side causes exhaustion in oil revenues, and this make the trade balance in permanent
... Show MoreThe first chapter the importance of research and need for education scientists see that the roots of the use of a specimen Wheatley in learning and teaching back to Grayson Wheatley, one of the largest supporters of a modern construction, which lay the groundwork for the specimen stage and the form in which it is. That was attributed to him, often called his name called while some educators based learning strategy on the issue. He sees the learner in this model make him a meaningful understanding of problems during his progress, thereby acting with his colleagues to find solutions to them in small groups. He
Borders Search: Search by students is determined by th
... Show MoreMany designs have been suggested for unipolar magnetic lenses based on changing the width of the inner bore and fixing the other geometrical parameters of the lens to improve the performance of unipolar magnetic lenses. The investigation of a study of each design included the calculation of its axial magnetic field the magnetization of the lens in addition to the magnetic flux density using the Finite Element Method (FEM) the Magnetic Electron Lenses Operation (MELOP) program version 1 at three different values of current density (6,4,2 A/mm2). As a result, the clearest values and behaviors were obtained at current density (2 A/mm2). it was found that the best magnetizing properties, the high
... Show MoreFiber reinforced polymer composite is an important material for structural application. The diversified application of FRP composite has taken center of attraction for interdisciplinary research. However, improvements on mechanical properties of this class of materials are still under research for different applications. In this paper we have modified the epoxy matrix by Al2O3, SiO2 and TiO2 nano particles in glass fiber/epoxy composite to improve the mechanical and physical properties. The composites are fabricated by hand lay-up method. It is observed that mechanical properties like flexural strength, hardness are more in case of SiO2 modified epoxy composite compare to other nano
... Show MoreIn this study, cadmium oxide (CdO) was deposited on glass bases by thermal chemical spraying technique at three concentrations (0.05, 0.1, 0.15) M and then was irradiated by CO2 laser with 10.6 μm wave length and 1W power. The results of the atomic force microscope AFM test showed that the surfaces of these CdO thin films were homogenous and that the laser irradiated effect resulted in decreasing the roughness of the surface as well as the heights of the granular peaks, indicating a greater uniformity and homogeneity of the surfaces. The optical properties were studied to determine laser effect. The results of optical tests of these thin films showed that the photoluminescence spectra and absorption s
... Show MoreAbstract
Objective(s): The study aims to measure the effectiveness of the program on removing dead tissue for burn patients by testing the nurses before the program in addition to testing them again after implementing the educational program.
Methodology: The study is quantitative in nature (one experimental) and will employ pre- and post-testing techniques between October 17, 2020 and March 20, 2022. A non-probability (purposive) sample of 24 nurses working in the Azadi Teaching Hospital's Burns and Plastic Surgery Center was chosen. The experimental survey of nursing practice, a literature review, scientific records, and previous research were all taken into considerat
... Show MoreThis study investigates the Linguistic and Conceptual equivalence of Conner’s Revised Scales when applied on a Sudanese sample. Sudanese parents and teachers completed behavior-rating scales on a stratified sample of 200 children. These instruments were based on Conner’s parent -48 and teacher-28 questionnaires. Following a reliable translation into Sudanese Arabic the test-retest reliability of the items and the internal consistency of the original Conner’s' revised scales were explored. The associations between scale scores and between parents and teachers scores were also examined. Both instruments displayed good reliability and the original Conners scales had satisfactory internal consistency. The inter-correlation sugg
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More