Although the profession of a marriage mediator is dominated by a social character, and it is also characterized by its practice in the midst of strict secrecy, because Eastern societies innately reject this method of searching for a life partner. The two parties play a prominent role of the will in the events of legal effects, and the obligations and rights owed by the contracting parties, which leads us to consider the agreement between the mediator and the one who wants to marry going to the purely contractual nature, and thus requires the correct legal adaptation on the contractual relationship that is achieved between the marriage mediator and his clients from Those who want to get married and therefore we will divide this research into six demands to clarify the legal qualification of the marriage mediation contract.
The MTS-88. c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembly. It has the problem that long programs cannot be traced and tested efficiently. A simple error may cause all the code to be erased and the system to stop responding. Also, this system lacks the ability to be connected to the PC. The aim of this work is to modify the system to make it possible to be connected to the PC through the parallel port. This gives the capability to download long programs to the system after being developed in the PC. The 8255 Programmable Peripheral Interface available in the teaching system is interfaced to the parallel port and used as
... Show MorePDBN Rashid, International Journal of Professional Studies, 2023
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThis paper aims at investigating the effect of postmodernism and technology on the social life in Don Delillo's novel The White Noise. In this novel, Don Delillo portrays the chaotic life by using modern technology which has been presented by three ways. The first way is by television as being a source of information and entertainment. The second way is by the toxic event whereas the third is by Dylar's episode and its destructive consequences. He depicts that through the atmosphere of Jack's family plus its effects on the life and thoughts of the elders and society. He proves that technology is leading humanity not to safety, but to death. He further highlights that by showing the impact of technology on the life of the main charac
... Show MoreThis research focuses on the contemporary geostrategic transformations that afflicted the countries of the Middle East, with a focus on the countries of the Arab East, after the collapse of the system of international relations, and the emergence of the unipolar system led by the United States of America. After the events of September 11 and the events that followed, especially the occupation of Iraq in 2003, the study area witnessed a group of geopolitical variables and the emergence of dangerous phenomena that threatened the state structure in the countries of the Middle East; the most notably are the phenomenon of terrorism, cross-border armed groups, sectarian polarization, the phenomenon of migration and the internal and the externa
... Show MoreThis paper presents the synthesis of a polypropylene nanocomposite. The nanocomposites were characterized using different techniques: atomic electron microscopy (AFM), surface shape was evaluated by (SEM),(EDS),(XRD) and (FTIR). The study showed that the platinum nanocomposite had a fatal effect on both strains of bacteria used, as well as on the growth of fungi. The compound tested showed antioxidant properties moderate activity was found. The mentioned material were evaluated in normal cell line HdFn (Human Dermal Fibroblasts, neonatal) and breast cancer MCF-7 cancer cell line , by MTT assay for study cytotoxic effects, morphological changes, all experiments were conducted on cell lines by using the
... Show MoreTThe property of 134−140Neodymium nuclei have been studied in framework Interacting Boson Model (IBM) and a new method called New Empirical Formula (NEF). The energy positive parity bands of 134−140Nd have been calculated using (IBM) and (NEF) while the negative parity bands of 134−140Nd have been calculated using (NEF) only. The E-GOS curve as a function of the spin (I) has been drawn to determine the property of the positive parity yrast band. The parameters of the best fit to the measured data are determined. The reduced transition probabilities of these nuclei was calculated. The critical point has been determined for 140Nd isotope. The potential energy surfaces (PESs) to the IBM Hamiltonian have been obtained using the intrin
... Show More