The freedom to promote ideas is one of the freedoms protected by constitutions and laws, and it is exercised by individuals through traditional and electronic media. However, this freedom must be exercised according to certain limits, represented by the necessity of respecting human rights, just as individuals have the freedom to exercise their right to publish and express their opinion in every way. Frankly, in return, she must respect the rights of others . Perhaps the development that has occurred in the various media, including journalism, radio, television, and the emergence of a new medium represented by the Internet, has contributed significantly to harming the security of individuals through the promotion of extremist ideas. This behavior undoubtedly represents a mistake that requires compensation, which would raise liability. Civil liability for promoting extremist ideas, which could be a contractual or tort liability, and this compensation can be through various means. It may be compensation in kind, represented by the right of response and correction, which means the right of every person to clarify, confront, or correct what was published about him and caused harm to him .
The role of the public sector- Investment customizations- economic embargo - The role of the private sector - Coexistence between the public and private sectors - Ratio of growth
Nitinol (NiTi) is used in many medical applications, including hard tissue replacements, because of its suitable characteristics, including a close elastic modulus to that of bones. Due to the great importance of the mechanical properties of this material in tissue replacements, this work aims to study the hysteresis response in an attempt to explore the ability of the material to remember its previous mechanical state in addition to its ability to withstand stress and to obtain the optimal dimensions and specifications for the manufacturer of NiTi actuators. Stress-strain examination is done in a computational way using a mutable Lagoudas MATLAB code for various coil radii, environment temperatures, and coil lengths. The computational m
... Show MoreBackground: occult blood loss must be considered as a
possible cause in every case of iron deficiency anemia.
Objective: to evaluate upper gastrointestinal endoscopy
in finding a potential cause for iron deficiency anemia
among children in Al-Anbar governorate.
Methods: Twenty five children aged 2-14 years, referred
to the gastroenterology unit in Al-Ramadi General Hospital
for upper gastrointestinal endoscopy had iron deficiency
anemia. Fiberoptic endoscopy was used under general
anesthesia and endoscopic tissue biopsies were taken from
22 patients for histopathological examination.
Results: The main presenting signs and symptoms were
pallor, abdominal pain, and stunting. The upper
gastrointestinal
Recent reports of new pollution issues brought on by the presence of medications in the aquatic environment have sparked a great deal of interest in studies aiming at analyzing and mitigating the associated environmental risks, as well as the extent of this contamination. The main sources of pharmaceutical contaminants in natural lakes and rivers include clinic sewage, pharmaceutical production wastewater, and sewage from residences that have been contaminated by drug users' excretions. In evaluating the health of rivers, pharmaceutical pollutants have been identified as one of the emerging pollutants. The previous studies showed that the contaminants in pharmaceuticals that are widely used are non-steroidal anti-inflammatory drugs, ant
... Show MoreFinancial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which co
... Show More