Agricultural lands have great importance in people's lives, and their exploitation has a great impact on strengthening the national economy. Therefore, countries have given great importance to this sector, and because of the importance of this sector, the state has given large areas of these lands to the farmers to invest in agriculture, and among these farmers are those who died and left behind children who took up crafts. Agriculture, for fear that these agricultural lands would be abandoned and turned into waste lands, a land system was introduced called (regular distribu- tion), which corresponds to (legitimate inheritance). Under this system, these lands were trans- ferred to the children of farmers who died so that the process of investing these agricultural lands in the production of agricultural crops could continue. This system has its rules that differ greatly from the rules of inheritance in Islamic law. Many people misunderstood this system to the point that they thought it was an inheritance. Legally, they began dividing it according to the legitimate inheritance. Due to the neglect of the competent authorities in this field in preserving these lands that belong to the state, people began selling these lands as if they were personal property. There- fore, this research shed light on this important issue and demonstrated the difference between (regular distribution and legitimate inheritance) as It was stated that the ownership of these lands is due to the state represented by the Ministry of Maliki and the Ministry of Agriculture. The re- search also showed the types of agricultural lands.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThe present study aims at examining quantitatively the morphometric characteristics of Iziana Valley basin that is located in the northern part of Iraq; particularly in south of Erbil Governorate. This basin is considered one of the small sub-basins where its valleys run on formations of the Triple and Quadrant Ages, which are represented by the Bay Hassan formations, and the sediments and mixed sediments of the cliffs, respectively. The area of the Iziana basin amounts to (36.39 km2) whereas the percentage of its rotation reaches (0.17); a low percentage, which indicates that the basin diverges from the circular to the rectangular shape. The value of the elongation ratio of the basin reaches (0.38) while the terrain rat
... Show MoreThe plants of genus Heliotropium L. (Boraginaceae) are well-known for containing the toxic metabolites called pyrrolizidine alkaloids (PAs) in addition to the other secondary metabolites. Its spread in the Mediterranean area northwards to central and southern Europe, Asia, South Russia, Caucasia, Afghanistan, Iran, Pakistan, and India, Saudi Arabia, Turkey, and over lower Iraq, Western desert. The present study includes the preparation of various extracts from aerial parts of the Iraqi plant. Fractionation, screening the active constituent, and identification by chromatographic techniques were carried out.Heliotropium europaeum
... Show MoreThis research was carried out to reveal the the technique of the recitation in this story including a preface, introduction, two chapters and the conclusion. the introduction consisted of the problem, significance , purpose and limitations of research. The preface included two paragraphs. The first included a meta-recitation of terminology and semantic. The second paragraph devoted to show the cultural identity of Hussein Rahim. The first chapter aimed to reveal the reality and the imaginary in the story of Na'lat Al Hakawaty (storyteller's curse). The second chapter aimed to study the strange arguments in the story. The research concluded the conclusion by presenting the results for attaching them with the margins, and the references
... Show MoreThe factors influencing the financial market are rapidly becoming more complex. The impact of non-financial factors on the performance of a company’s common stock can increase in ways that were not previously expected. This study investigated how brand capital affects the risk of stock prices in Iraqi private banks listed on the Iraq Stock Exchange failing by identifying the likelihood of a crash caused by a negative deviation in the distribution of returns on ordinary shares. As a result, the current study’s concept is to review an analytical knowledge framework of the nature of that relationship, its changes, and its impact on the pricing of ordinary shares of the banks of the researched sector for the years 2009 to 2017, as w
... Show MoreAbstract:-
The title of the thesis (TAQWA "Piety", TAWAKKUL "Trusting” AND NIYYAH "Intention" ARE AMONG THE FACTORS OF ADJUSTMENT) is related to the first legislative source of Islam, the Qur’an, and highlights the positive effects while adhering to the teachings of Islamic Sharia in terms of its importance in building the individual and thus society.
In this study, the researcher follows the objective approach, which includes collecting verses that refer to the issue of piety, trust and intention, and studying the verses objectively according to the sources, language books, ethics, and so on.
I sought to give each topic important headings, then study the topic and clarify it in general, based on narrations an
... Show More