The law contains many types of formal contracts, including the sale of real estate contract, the mortgage and the mortgage insurance on real estate, and the contract for the sale of machinery and vehicles and the contract of sale of the ship. The purpose of this research is to highlight the concept of form, because of the growing importance that has become and which began to expand the expansion of contracts and the multiplicity of new contracts have become necessary to the legal texts to address the effects of legislative treatment, especially electronic contracts, which form has an important role in the conclusion for the privacy it enjoys. Where the vast and accelerating development in today's world, which knows no boundaries except God's will, requires abandoning the traditional methods of life in general, and the tendency to satisfy them through the computer and dialogue through those and the elimination of borders for the speed of those devices easy to use. This leads us to: 1) examine the nature of these contracts and 2) the extend of the possibility of adhering to traditional formality, and 3) whether electronic formality could replace traditional formalism to overcome the difficulties of establishing electronic contracts? And 4) can formalities be completed in the same way when an electronic contracts is concluded its writing on paper or it absorbs electronic writing? And 5) whether the electronic signature is the normal signature required by law? And 6) are the rules for electronic contracts applied to all contracts and legal acts or there are contracts and action excluded from subject to electronic formalities.
Human values are the most important concepts that the interest of society has to relay on these conceptual values. Any society will not be stabilized unless adheres to the right principles and values, all nations need such principles and values to stabilize. If any society doesn’t implement the human values that monotheistic religions urges equality between human, the far the society from the religious principles, the less there would be valence between human. The valence is urgent necessity in the current time. The far people get away from values and principles, the more they lose their freedom and dignity, therefore individual has to live with dignity and respect through the adherence to these values and principles. Apparently, equal
... Show MoreIn this research design was treated gap laser mathematically and practically Bashaddam model Raasi simple and new and we have found that there is a good match in the practical and theoretical results
Roller compacted concrete (RCC) is a concrete compacted by roller compaction. The concrete mixture in its unhardened state must support a roller while being compacted. The aim of this research work was to investigate the behavior and properties of roller compacted concrete when constructed in the laboratory using roller compactor manufactured in local market to simulate the field conditions. The roller compaction was conducts in three stages; each stage has different loading and number of passes of the roller. For the first stage, a load of (24) kg and (5) passes in each direction had been employed. For the second stage, a load of (104) kg and (10) passes in each direction were conducted. Finally, at the third stage, a load of (183) kg a
... Show MoreBackground: To elucidate the possible role of human cytomegalovirus in pregnancy loss through induction of certain pro-inflammatory adhesion molecules.
Methods: Paraffin embedded sections of curate samples were obtained from 34 women had spontaneous abortion, and 5 women had elective termination of pregnancy (as control), and then subjected for immunohistochemistry analysis to detect human cytomegalovirus (HCMV) early protein and VCAM-1 molecule.
Results: Nine out of 34 women with spontaneous abortion were positive for HCMV early protein, with a
significantly higher expression of VCAM-1 in HCMV positive cases as compared with HCMV negative and the control groups (p = 0.05, 0.001 respectively).
Conclusion: HCMV infection may p
This study was conducted to determine the side effects of dexamethasone n some physiological and immunological criteria, which included, Measuring sugar level, liver (ALT, AST , LDH, Total protein) and kidney function (urea, createnine), total and differential count of W.B.C,CRP, TNF-α ,IL6,IL10. thirty rats were divided into two groups (15\ rat). G1: This group was considered negative control injection with normal saline, G2: This group was injected with 2 mg\kg dexamethasone. The results showed a significant increase in the level of enzymesALT, AST and sugar levels and decreased level of total protein in the group treated with the drug, also showed, a significant decrease in the total number of W.B.C an
... Show MoreToxoplasmosis is a widespread infection usually caused by Toxoplasma gondii (T. gondii) parasite. It occurs in humans and other warm blooded animals, causing severe problems. It was found that there is an alteration in the trace elements concentrations levels associated with some human diseases. This study aimed to investigate the changes in the concentrations of some trace elements (Mg, Fe , Zn, and Cu) in the sera of 60 immunocompetent patients with chronic toxoplasmosis and 82 healthy individuals as a control group. Measuring the serum level of seropositivity rate of anti-T. gondii antibodies was done by Enzyme Linked Immunosorbent Assay (ELISA) Kit, while the concentrations of trace elements were measured by absorption spectrophotometry
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More