Young people represent the power and cornerstone of societies and their superiority is linked to their well-being. Their empowerment is as essential as the heart to the body, if it is corrupt, then the whole body is corrupt, and vice versa. The exposure to extremism and pressure from their families leads to violent acts and crimes for obtaining money through unknown organized bodies. This will drive them to fail in their life in an attempt to fulfill their most basic needs, which they have been deprived of by their families, the government, and other institutions. Therefore, governments should provide job opportunities for young people and provide entertainment centers, sports clubs, and family education centers that raise awareness of staying away from domestic violence and reduce family pressure on young people. Besides, governmental institutions should assist young people to achieve their ambitions, foster their talents, avail them in the decision-making process, and put them in the right place instead of stumbling into extremism, evil, and crime. The whole country and its society could be the target point of the young to reflect their extremism and deviation in countless ways. Crime, vice, and extremism, which have multiple sources and types, are spreading in society because of family breakdown, violence, lack of economic returns, and limited scientific level, in addition to the social environment in which young people live. The findings of the study revealed that 95% of young people are exposed to extremism due to their continuing differences and permanent conflicts with their families. Also, in recent years, parents are preoccupied with poor living conditions and similar matters, resulting in neglecting their children who suffer pressure that leads them to perform extremism with other groups
Heterogeneous organic compounds play an important role in our daily life as they contribute in many medical and industrial fields and are in continuous development as a result of the preparation of new derivatives with different properties. From this premise, the goal of this work appears, which is preparation of (four, five, six, and seven) membered ring systems derived from furfural, by its reaction with different aromatic aldehydes, and record their antioxidant activity by using free radical scavenging method of DPPH radicals. The new ring systems are synthesized by reacting the prepared Schiff-bases with different ring closure agents (chloroacetyl chloride, mercaptoaceticacid, anthranilic acid, and phthalic anhydride), the prep
... Show MoreMost available methods for unit hydrographs (SUH) derivation involve manual, subjective fitting of
a hydrograph through a few data points. The use of probability distributions for the derivation of synthetic
hydrographs had received much attention because of its similarity with unit hydrograph properties. In this
paper, the use of two flexible probability distributions is presented. For each distribution the unknown
parameters were derived in terms of the time to peak(tp), and the peak discharge(Qp). A simple Matlab
program is prepared for calculating these parameters and their validity was checked using comparison
with field data. Application to field data shows that the gamma and lognormal distributions had fit well.<
The aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show MoreThe study of entry and reentry dynamics for space vehicles is very important, particularly for manned vehicles and vehicles which is carry important devices and which can be used again. There are three types for entry dynamic, ballistics entry, glide entry and skip entry. The skip entry is used in this work for describing entry dynamics and determining trajectory. The inertia coordinate system is used to derive equations of motion and determines initial condition for skip entry. The velocity and drag force for entry vehicle, where generate it during entry into earth’s atmosphere are calculated in this work. Also the deceleration during descending and determining entry angles, velocities ratio and altitude ratio have been studied. The c
... Show MoreBackground: overweight and obesity are the fifth leadingrisk for global deaths. At least 2.8 million adults die eachyear as a result of being overweight or obese. Numerousstudies show that weight loss, even if only 5-10%,significantly improves dyslipidemia, hypertension, diabetesmellitus, risk for osteoarthritis and its symptoms and risk forselected cancers.Objectives: is to evaluate the effect of diet and exerciseprogram on anthropometric and biochemical status of adultobese patients.Methods: descriptive study. 124 adult obese patientsattending Al Kindy obesity research and therapy unit duringDecember 2012 were included. Measurement of Wt, heightHt and WC performed and BMI was calculated. Laboratorytest analysis, on the fasting state, w
... Show MoreThe concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show MoreObjective: This study was conducted to identify the association of HLA-DRB1/DQB1 genes with the susceptibility or resistance to type 1 diabetes mellitus (T1D) among patients between the ages of five and eighteen.
Subjects and Methods: The study included 200 Sudanese participants, ages ranging from 5 to 18. One hundred participants were healthy non-diabetic as the control group and 100 with T1D as the case group. The investigation was carried out in Khartoum state. The selection of patients with T1D was from diabetic centers and hospitals. The allele-specific-refractory mutation system-polymerase chain reaction (ARMS-PCR) techniq
... Show More