The aim of this study to investigate the sexual harassment, prevention strategies, and the appropriate ways that tackle this phenomena. The current research consisted of four chapter; the first chapter gave a general introduction about the targeted topic followed by the problem of statement, the significance of study, study’s aims, and end with the limitations of study. The second section of chapter one referred to the common concepts of study. Third section addressed the previous studies that related to the current one. Chapter two concerned with the sexual violence against minors. It has four section; first section addressed number of concepts which related to sexual violence. The second section focused on the implications of sexual violence and harassment. Third section presented the prospective of sociology toward sexual violence and harassment (family disintegration, breaking up and the post-trauma disorders, violence against minors, child trafficking as one of the serious challenges during childhood, and the effect of sexual violence and harassment on society). The third chapter revealed the Islamic law’s prospective of sexual anomalies and sexual violence, How parents prevent minors from sexual violence, the role of parents when the harassment occurs, how to promote the protective and preventive measures, the using of appropriate techniques to prevent minors against sexual violence, united nation’ rules of sexual violence, united nation’s role of making ultimate strategies of sexual violence, and finally, he put forward some recommendations and suggestions.
Prediction of accurate values of residual entropy (SR) is necessary step for the
calculation of the entropy. In this paper, different equations of state were tested for the
available 2791 experimental data points of 20 pure superheated vapor compounds (14
pure nonpolar compounds + 6 pure polar compounds). The Average Absolute
Deviation (AAD) for SR of 2791 experimental data points of the all 20 pure
compounds (nonpolar and polar) when using equations of Lee-Kesler, Peng-
Robinson, Virial truncated to second and to third terms, and Soave-Redlich-Kwong
were 4.0591, 4.5849, 4.9686, 5.0350, and 4.3084 J/mol.K respectively. It was found
from these results that the Lee-Kesler equation was the best (more accurate) one
Women's rights in social studies and national textbooks in the secondary stage in the light of the international charters of women's rights and the cultural specificity of the Saudi society Abstract The current study focuses on exploring women rights that required to be involved in social studies and national textbooks in the secondary stage in the light of international conventions on women's rights and cultural specificity of the Saudi society, as well as to reveal the teachers and educational supervisors' estimation about the degree of importance of those components included in the books, and then build a matrix of the range and sequence of women's rights in the books of social studies and national in the secondary stage. The study us
... Show MoreIn this paper, Bayes estimators of the parameter of Maxwell distribution have been derived along with maximum likelihood estimator. The non-informative priors; Jeffreys and the extension of Jeffreys prior information has been considered under two different loss functions, the squared error loss function and the modified squared error loss function for comparison purpose. A simulation study has been developed in order to gain an insight into the performance on small, moderate and large samples. The performance of these estimators has been explored numerically under different conditions. The efficiency for the estimators was compared according to the mean square error MSE. The results of comparison by MSE show that the efficiency of Bayes est
... Show MoreWe present a simple model of charge transfer current through sensitizer N3 molecule contact to TiO2 and ZnO semiconductors to calculate the charge transfer current. The model underlying depends on the fundamental parameters of the charge transfer reaction and it is based on the quantum transition theory approach. A transition energy, driving energy and potential barrier have been taken into account charge transfer current at N3 / TiO2 and N3 / ZnO devices with wide polarity solvents Acetic acid, 2-Methoxyethanol, 1-Butanol, Methyl alcohol, chloroform, N,N-Dimethylacetamide and Ethyl alcohol via the quantum donor-acceptor system.The effects of the transition energy and potential barrier are computed and discussion on charge transfer current.
... Show MoreThe current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method). Qualitative and quantitative determinations of epicatechin in two tea samples were investigated. Epicatechin identification was made by utilizing preliminary chemical tests and TLC. This identification was also boosted by HPLC and then quantified epicatechin in all ethyl acetate fractions of two tea samples. This research revealed the existence of epica
... Show MoreToxoplasma gondii has a worldwide distribution and it is one of the most prevalent infectious agents in Iraq. The study was conducted on 200 serum samples of unmarried female university of students age ranged between 18 to 26 years to detect Toxoplasma gondii antibodies. The aim of this study was to detect T. gondii antibodies among unmarried female students in Iraqi universities using different serological tests. Seventy six (38%) serum samples out of 200 subjects were positive for toxoplasma antibodies by Latex agglutination test (LAT). Among 76 LAT sera positive ,only 58 (29%) serum samples were positive with toxoplasma IgG ELISA test , however , the results of IgM ELISA assay were positive only for 3 (1.5%) unmarried
... Show More(3) (PDF) Theoretical investigation of charge transfer at N3 sensitized molecule dye contact with TiO2 and ZnO semiconductor. Available from: https://www.researchgate.net/publication/362773606_Theoretical_investigation_of_charge_transfer_at_N3_sensitized_molecule_dye_contact_with_TiO2_and_ZnO_semiconductor [accessed May 01 2023].
The research aims to show the role or extent of the impact of financing in its various forms on the municipal performance before and after the financial deficit through relying on the analytical research methodology of the research community represented by the Directorate General of Municipalities and the Directorate of Maysan municipalities as a sample of research (13) municipal institutions for a period of (8) years, Considering the completion of the final accounts of these years, which provides the necessary data for the study, in addition to the variation in the quality and amounts of grants allocated to municipal institutions during these years, which gives a clearer and more comprehensive picture of the reality of allocatio
... Show MoreThe article characterizes metaphors and comparisons as a means of rethinking the phenomena of the surrounding world; two directions are named within which metaphors and comparisons are studied: 1) the linguo-classification direction combines several classifications of metaphors and comparisons, which are basically focused on comparing two denotations through the meanings of word forms that are part of the trope; 2) the theoretical and conceptual direction is associated with the concept of conceptual displacement and is the basis of the theoretical and methodological study of metaphor and comparison, i.e. the modern theory of metaphor is being formed; The main attention is focused on the comparative concept of Aristotle, which postul
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show More