Everywhere carriers incur a measure of liability for the safety of the goods. Carriers are liable for any damage or for the loss of the goods that are in their possession as carriers unless they prove that the damage or loss is attributable to certain excepted causes. Damaged and lost items can unfortunately be a common problem when shipping freight. Legal responsibilities arise due to loss or damage during transit while cargo is in their care. This study intends to investigate the nature of the liability of the maritime carrier when this liability is realized, and the extent to which it can be paid or disposed of given the risks realized from the transportation process, which may result in damage or loss of the goods, and the damage that may cause to the consignee because of this damage or loss.
This study aims to formulate azithromycin oleogel to locally treat skin infections such as acne vulgaris and skin wound infection. Providing a form of azithromycin that can be administered topically is highly desired to prevent unwanted systemic complications including diarrhea, nausea, and abdominal pain. Additionally, it will avoid first pass metabolism, improves patient acceptance, provides an alternative in nauseated patients, decreases the dose by direct contact with the pathological site, and provides a noninvasive and convenient mode of administration. Furthermore, for treating wound infections, the gel will act as a scaffold biomaterial for wound closure besides its antibacterial effect. Herein, we propose the use of grapeseed oil-b
... Show MoreFreedom of opinion is one of the freedoms that constitutions and laws have guaranteed to protect and is exercised through the media. However, this freedom must be exercised within certain limits, which include respecting a person’s right to preserve his privacy, image and reputation. Just as the media has the freedom to exercise its right to publish and express its opinion with complete frankness, it is in return obligated to respect the rights of others and avoid defaming them and violating their privacy. If the media does this, the injured party has the right to demand compensation for the damage he has suffered as a result.
The duty of care is the essence of the error of negligence under the English legal system, and without it, responsibility for negligence cannot be judged, regardless of the extent of the damage incurred. contained in English law. In view of the importance of proving the existence of the duty of care on the defendant so that it is possible to judge his responsibility for negligence, the need arises to find a general principle to which the defendant is subject in order to decide whether he owes the plaintiff with the duty of care and therefore responsible for the negligence, and this is what we will explain in the research topic the study.
It is necessary to examine the nature of the Turkish position and what Turkey seeks to achieve at the international, regional and Iraqi levels. Or is this external role an expression of foreign policy and has not yet reached the level of maturity that reaches the stage of strategy? The answer to this question is the essence of research in the Turkish role. The answer to this question requires the realization of the elements and pillars that guarantee Turkey's continuity and survival. Continuity is a cornerstone of the strategy. The continuity of the role and its interaction with the event and the ability to employ multiple alternatives are what qualify the state to describe its politics. The external strategy has evolved into. In order t
... Show MoreThe current research aims to show the impact of the international auditing standard IAS 540 in reducing income smoothing practices in Iraq. To achieve the objectives of the research, the researcher adopted a questionnaire for a sample of auditors in Iraq. Where 60 forms were distributed and after the questionnaire was retrieved and statistical analysis was done using the SPSS program, The research reached a number of results, the most important of which are: the existence of a statistically significant effect of the application of the international auditing standard IAS 540 in reducing income smoothing practices, The research recommended the necess
... Show MoreSome of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
Abstract:
The research concerned the study of the railway transport sector in selected countries that sought to raise the efficiency of the railway network and develop it, after realizing the importance of this vital sector, which is a link between it and the rest of the other economic sectors.
The research sought to explain the methods, methods and procedures adopted by these countries for the development of the railway sector, and to benefit from these experiments to improve the efficiency of the railway transport sector in Iraq.
The railway transport sector in Iraq suffers from the erosion of railway lines and mobile units such as locomotives, pas
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show More