Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order to raise community awareness of the dangers of these crimes and their dimensions and manifestations that are still under study and research and digital exploration and statistical especially states that characterized Banglagaha prolonged contact of the world , making it more vulnerable to such crimes characterized by a high degree of organization , precision and uncertainty for large segments of individuals , specifically in the Iraqi society , The importance of this study lies in its search optimization for this phenomenon, and the legacy of a great vacuum in punitive legal aspect to criminalize this type of crime, which requires us a quick review of all laws that seek to curb cyber crime, whether at the international, regional or Arab or national through a modification and change, so in line with the new reality
The consisting of four topics to study in answer focused on some questions including: What are the cyber crimes, and what are the kinds of characteristics, and what are the difficulties that could face means control at the international level and Aarabiy and local, and what are the risks to various private groups in society, the kids category 1. The study has concluded that these crimes notifier great on all members of the community, especially children.
2. It threatens Social Security is not only the local and national community, but that the risks and penetrate beyond the territorial and national and international borders.
3. Azert results that traditional laws and new laws still do not rise to the level of combating this type of crime, and need more studies with to find the kind of coordination and cooperation with various countries to track crimes that carry the trait and the nature of the laws that could criminalize the perpetrators real quest.
4.Azart study that this type of crime suffered material losses and moral expensive process threatens the advancement of society and its development in the long run, particularly with regard to terrorism and the exploitation of children in this type of crime offenses.
A laboratory experiment was carried out according to a completely randomized design with four repetitions on the seeds resulting from a field experiment applied for the two seasons, 2020 and 2021, to find out the effect of the cultivars (Ambar 33, Yasamin, Dijlah, Ambar Al-Baraka and Furat 1) and the harvest dates (at physiological maturity and after 7 and 14, 21 and 28 days of physiological maturity) on the vigour of rice seeds. The results showed the superiority of the seeds of the cultivar Anbar Al-Baraka at first and final counting, dry weight of the seedling, seedling vigor index and electrical conductivity, and the superiority of the seeds of Dijla cultivar at accelerated aging test and cold test without significant difference with th
... Show MorePraise be to God, Lord of the worlds, and the best of prayers, and the completion of the blessing of our master Muhammad Al-Hadi Al-Amin, his family and companions, the righteous and those who followed his path and guided him to the day of judgment.
And after:
It is God's human honor that he has legalized marriage and made optimal goals and intentions for her:
1 establish a safe and reassuring life between the husband and his wife based on the tranquility and love and compassion is achieved through satisfying the instincts of the road project from the verse: and that He created for you mates from among yourselves to find repose in them and put between you affection and mercy in this are Signs for those who reflect ()
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show Morethe behavior of the first-order black and gray solitons propagtedin optical fiber in the presence of frequency chirp is studied analytically and numerically results show that phase profile of black solitons changes abruptly
Hierarchical temporal memory (HTM) is a biomimetic sequence memory algorithm that holds promise for invariant representations of spatial and spatio-temporal inputs. This article presents a comprehensive neuromemristive crossbar architecture for the spatial pooler (SP) and the sparse distributed representation classifier, which are fundamental to the algorithm. There are several unique features in the proposed architecture that tightly link with the HTM algorithm. A memristor that is suitable for emulating the HTM synapses is identified and a new Z-window function is proposed. The architecture exploits the concept of synthetic synapses to enable potential synapses in the HTM. The crossbar for the SP avoids dark spots caused by unutil
... Show MoreThe results of studying the effects of M. anisopiliae spores on mosquito, C. quinquefasciatus showed a biological effects represented by immature mortality. The mortality increased proportionally with the concentrations of fungal spores, which reached (at high concentration 2×1011 spores / ml), to 86.6, 56.6% in first and late instar larvae, respectively. An important to mention that cumulative death rate was significantly associated with the time, which reached to 56% at 7 day after treatment. In addition, M. anisopiliae had a long period permanence in aquatic habitats; in which the residual effects stay 30 days in aquatic habitats after treatment at laboratory conditions. Interestingly, the long period exposure of fungal spores (30 minut
... Show MoreThe current report dealt with the effect of pesticides on the ecosystem through their impact on soil, water, and microorganisms and their impact on human health. As well as this study dealt with the biodegradation process of pesticides and the organisms involved in this process, even some previous studies proved that Bacillus spp. And Pseudomonas sp. Bacteria is the most efficient in the biodegradation of pesticides, at the same time, other previous studies dealt with the environmental factors that affect the biodegradation process of pesticides. It proved that each of the incubation periods, pH, and temperature have different effects on biodegradation. Most of the studies indicated that the best incubation period for biodegradation is 7-8
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More