The field study of this paper focused on the motives for lawyers to use the website
of the Supreme Judicial Council, and the gratifications achieved as a result of its use.
This study sought to achieve a number of goals, including:
1. Monitoring the patterns of lawyers’ use of the website of the Supreme Judicial Council.
2. Determining the forms that lawyers use to interact on the website of the Supreme
Judicial Council.
This study is a descriptive in kind as the researcher relied on the ‘survey method’ in
its study of the external audience (lawyers) using the questionnaire and scale toolThe questionnaire was distributed among a deliberately chosen sample, consisting of
(160) lawyers who used the website of the Supreme Judicial Council. The study ended
with a set of results, the most important of which are:
A. It turns out: Lawyers’ use of the website of the Supreme Judicial Council is as follows:
Lawyers’ use of the website which came in first place is of (on average twice
a week), followed by second place is of (three times a week), and third is of (once a
week).
B. The results showed that: The utilitarian motives for lawyers’ use of the website
were as follows: the one is ranked first (it keeps me in line with the development
in my legal field), while the one ranked last (it gives me the opportunity to express
my opinion on various legal cases). As for ritual motives, this category is ranked first
(which contributes to the dissemination of legal texts that are useful to others), while
the category (which helps to get rid of personal problems and forget them and the
desire to have fun) is ranked last..
Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreIn this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t
... Show MoreDespite extensive investigations, an effective treatment for sepsis remains elusive and a better understanding of the inflammatory response to infection is required to identify potential new targets for therapy. In this study we have used RNAi technology to show, for the first time, that the inducible lysophosphatidylcholine acyltransferase 2 (LPCAT2) plays a key role in macrophage inflammatory gene expression in response to stimulation with bacterial ligands. Using siRNA- or shRNA-mediated knockdown, we demonstrate that, in contrast to the constitutive LPCAT1, LPCAT2 is required for macrophage cytokine gene expression and release in response to TLR4 and TLR2 ligand stimulation but not for TLR-independent stimuli. In addition, cells transfe
... Show MoreThis work aims to investigate the integrated ultra-dense wavelength division multiplexing (UDWDM) and polarization division multiplexing (PDM) schemes incorporated in the free space optic (FSO) communication system. Erbium-doped fiber amplifiers (EDFAs) are used as post and pre-amplifiers in the proposed UDWDM–PDM–FSO system to boost the transmission power for increasing the distance. Thirty-two channels are transported over the FSO link to realize the total data transmission of 160 and 320 Gbps with 0.08 and 0.1 nm channel spacing, respectively. Results are also reported with non-return to zero modulation schemes. The performance of the proposed UDWDM–PDM–FSO transmission sys
The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreBackground: The menopause is physiological changes in women that give rise to adaptive changes at both systemic and oral level. During menopause, ovarian function declines and the production of sex steroid hormones reduces significantly affecting the oral tissues and periodontal structures leading to chronic inflammation of the gingiva, increased risk of tooth loss. Aim of study: The present study was designed to estimate the oral hygiene status in relation to salivary estradiol level among pre and post-menopausal women. Materials and Methods: Ninety women aged 48-52 years old, the control group consisted of 45 pre-menopausal women and the study group consisted of 45 post-menopause were examined for gingival index, plaque index and calcu
... Show MoreBackground: Invasion in oral cancer involves alterations in cell-cell and cell-matrix interactions that accompanied by loss of cell adhesion. Catenins stabilize cellular adherence junctions by binding to E-cadherin, which further mediates cell-cell adhesion and regulates proliferation and differentiation of epithelial cells. The Wnt/β-catenin pathway is one of the major signaling pathways in cell proliferation, oncogenesis, and epithelial-mesenchymal transition. Aims of the study: to detect immunohistochemical distribution pattern and different subcellular localization of β-catenin in oral squamous cell carcinoma and relate such expression to Bryne’s invasive grading system. Materials and Methods: This study included 30 paraffi
... Show Moren each relapse. Objjec tt iiv es :: To sttudy diifffferentt ffacttors whiich miightt be associiatted or lleadiing tto
tthe occurrence off rellapse iin nephrottiic syndrome
Metthods:: A retrospective study of seventy patients with nephrotic syndrome with age range of 1-14 years, who were diagnosed and treated in Child's Central Teaching Hospital over the period of 1st of January and 1st of July 2008.
The patients were divided into three groups; frequent relapses group, infrequent relapses group and undetermined group. We compared between frequent relapses group and infrequent relapses group in regard to age, sex, type of presentation, biochemical findings which include; total serum protein, serum albumin and renal function test,
Background: The genetic polymorphisms of vitamin D receptor (VDR) have an association with thalassemia development, additionally to the environmental elements that elicited the disorder in the genetically predisposed individuals. As well, VDR functions responsible for the regulation of bone metabolism, such its part in immunity. Aim: The sitting study intended to inspect the association between thalassemia disease and the genetic polymorphisms of VDR among the Iraqi population then compared these findings to other findings of thalassemia patients in other different ethnic populations. Materials and methods: The restriction enzymes Bsm-I and Fok-I were applied to determine the genetic polymorphisms frequencies of VDR by a Polymerase Chain Re
... Show More