الغلط في القانون الانجليزي على انواع ثلاثة (غلط مشترك Common mistake ) يقع فيه الطرفان مع علم كل منهما بنية الآخر ويقبلها دون ان يشوب الاتفاق نقص او يعتريه تحفظ ، و(غلط من الجانبين Mutual mistake) يكون كل متعاقد واقعا في غلط فيما يتعلق بما قصده الآخر، فيقدم كل منهما عرضاً مخالفاً للآخر و(غلط من جانب واحدUnliteral mistake ) يقع فيه احد المتعاقدين فقط ويكون المتعاقد الآخر اما عالماً بالغلط او يفترض انه عالم به . فإذا دفع احد المتعاقدين بوجود غلط مشترك فإن هذا يعني اقراراً بوجود اتفاق اي توافر الايجاب والقبول ونية التعاقد ، اما اذا دفع بالغلط من جانب احد المتعاقدين فإن هذا يعني انكار لوجود الاتفاق من الاساس . فليس ثمة تطابق صحيح بين الايجاب والقبول وان تم توقيعه ، ومن ثم لا يوجد عقد، وهذا هو اثر التوقيع بالغلط على المستندات التعاقدية
The monitoring weld quality is increasingly important because great financial savings are possible because of it, and this especially happens in manufacturing where defective welds lead to losses in production and necessitate time consuming and expensive repair. This research deals with the monitoring and controllability of the fusion arc welding process using Artificial Neural Network (ANN) model. The effect of weld parameters on the weld quality was studied by implementing the experimental results obtained from welding a non-Galvanized steel plate ASTM BN 1323 of 6 mm thickness in different weld parameters (current, voltage, and travel speed) monitored by electronic systems that are followed by destructive (Tensile and Bending) and non
... Show MoreAutism Spectrum Disorder, also known as ASD, is a neurodevelopmental disease that impairs speech, social interaction, and behavior. Machine learning is a field of artificial intelligence that focuses on creating algorithms that can learn patterns and make ASD classification based on input data. The results of using machine learning algorithms to categorize ASD have been inconsistent. More research is needed to improve the accuracy of the classification of ASD. To address this, deep learning such as 1D CNN has been proposed as an alternative for the classification of ASD detection. The proposed techniques are evaluated on publicly available three different ASD datasets (children, Adults, and adolescents). Results strongly suggest that 1D
... Show MoreDue to the lack of statistical researches in studying with existing (p) of Exogenous Input variables, and there contributed in time series phenomenon as a cause, yielding (q) of Output variables as a result in time series field, to form conceptual idea similar to the Classical Linear Regression that studies the relationship between dependent variable with explanatory variables. So highlight the importance of providing such research to a full analysis of this kind of phenomena important in consumer price inflation in Iraq. Were taken several variables influence and with a direct connection to the phenomenon and analyzed after treating the problem of outliers existence in the observations by (EM) approach, and expand the sample size (n=36) to
... Show MoreThe current study aims to identify:The meta-motivation and Uniqueness seeking of the study sample. The correlated relationship among them. The present study sample consists of (400) students from the colleges of engineering, University of Baghdad, and the University of Technology in the academic year (2019-2020), and the researcher has adopted the Chen Scale (1995)to measure the meta-motivation after its translation into Arabic by(Al-Samawi,2011).The scale includes six dimensions. The researcher has also adopted the Snyder&Fromkin scale (1980) to measure the uniqueness seeking after translating and adapting it into the Arabic environment. The scale consists of three dimensions. The results show that students of the Facult
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreBackground: Breast Cancer is the most common malignancy among the Iraqi population; the majority of cases are still diagnosed at advanced stages with poor prospects of cure. Early detection through promoting public awareness is one of the promising tools in its control. Objectives: To evaluate the baseline needs for breast cancer awareness in Iraq through exploring level of knowledge, beliefs and behavior towards the disease and highlighting barriers to screening among a sample of Iraqi women complaining of breast cancer. Methodology: Two-hundred samples were enrolled in this study; gathered from the National
The purpose of this study was to find out the connection between the water parameters that were examined in the laboratory and the water index acquired from the examination of the satellite image of the study area. This was accomplished by analysing the Landsat-8 satellite picture results as well as the geographic information system (GIS). The primary goal of this study is to develop a model for the chemical and physical characteristics of the Al-Abbasia River in Al-Najaf Al-Ashraf Governorate. The water parameters employed in this investigation are as follows: (PH, EC, TDS, TSS, Na, Mg, K, SO4, Cl, and NO3). To collect the samples, ten sampling locations were identified, and the satellite image was obtained on the
... Show MoreThe research aims at the following:
- Identifying the level of internal quantity efficiency in Medical colleges, University of Baghdad by determining the level of productivity for one group for the total batch according to sex variable (males and females). Procedures of the study
The researcher used the descriptive and analytical method has been used by following them up enhanced by flow indicators of students for one session depending on special statistical data analyss .
The results are as follows:
- The Faculty of Medicine were higher productivity scholarships for one year and two years of schooling, as well as the highest in the efficiency of the Faculty o
... Show MoreThe control of water represents the safe key for fair and optimal use to protect water resources due to human activities, including untreated wastewater, which is considered a carrier of a large number of antibiotic-resistant bacterial species. This study aimed to investigate the prevalence of antibiotic-resistance to E. coli in Tigris River by the presence of resistance genes for aminoglycoside(qepA( ,quinolone (gyrA), and sulfa drugs( dfr1 ,dfr17) due to the frequent use of antibiotics and their release into wastewater of hospitals. Samples were collected from three sites on Tigris River: S1( station wastewater in Adhamiya), S2 (station wastewater in Baghdad Medical city hospital), S3 (station wastew
... Show MoreObjectives: The present study aims at detecting the depression among nurses who provide care for infected patients with corona virus phenomenon and to find out relationships between the depression and their demographic characteristics of age, gender, marital status, type of family, education, and years of experience of nurses in heath institutions, infection by corona virus, and their participation in training courses.
Methodology: A descriptive study is established for a period from October 10th, 2020 to April 15th, 2021. The study is conducted on a purposive (non-probability) sample of (100) nurse who are providing care for patients with COVID-19 and they are selected from the isolation wards. The instrument of the study is develope