This study aims at investigating the partial Islamic rules of preparing and distributing cartoons in order to issue an overall Islamic rul. To reach an end, descriptive and analytical approaches are adopted to clarify the nature of cartoons and other related concepts. The researcher, as well, with reference to verses of the Holy Quran, tradition (Hadith) and Islamic jurists, adopts a deductive approach to issue Islamic rules related to the industry of cartoons and it's distribution
The study consists of three sections. The first Section addresses the following issues: Definition animation; and related wordy. The second Section: Origin of Cartoon's history and it's negative and positive effects. The third Section: Islamic rules related to watching cartoons.
The study comes to following conclusions: as long as cartoons abide by Islamic rules, preparing, distributing, establishing TV channels, and watching cartoons are all religiously lawful (Halal); in addition, Islam recognizes the author's and broadcaster's rights as long as they abide by Islamic rules as well
News are considered the most press arts that supply the target audiences with daily information and events happened inside and outside society since it is formed by depending on its resources which have a deep relation with formal corporations to gain their satisfaction in order to support their authority and spreading their domination by using mass media in editing their viewpoints and achieving wide acceptance among public opinion. In the field of technological development and changing in the fields of politics, society, culture, economics etc. inside Iraqi society and democratic transition help to convert news agenda from independent variation to a fellow variation while in the past the variation of mass media was the independent one
... Show Moreلقد توسعت وتطورت انشطة منشآت الاعمال بشكل كبير، وقد تمكنت المحاسبة من التعامل مع هذا التطور من خلال ايجاد المعالجات المحاسبية التي تتوافق مع خصوصية هذه المنشآت وطبيعة انشطتها، وقد ادى مجلس معايير المحاسبة الدولية دوراً مهماً في تحقيق توافق المعالجات المحاسبية في غالبية دول العالم مع المنطق الذي يحمله الفكر المحاسبي.
في الربع الاخير من القرن الماضي ظهرت منشآت ذات خصوصية معينة يس
... Show MoreThe research aims to show the relationship between the use of automated accounting systems technology and its impact on enhancing the efficiency and effectiveness of the internal control system in a sample of Bahraini universities in light of the rapid changes in the electronic business environment. Automated accounting and its impact on enhancing the efficiency and effectiveness of the internal control system, and it is concluded through the analytical study of the research sample that there is a percenta
... Show Moreامكانية تكييف نظام الجودة في شركة الاسمنت العراقية وفقا لمتطلبات نموذج تاكيد الجودة iso9001 الخاص بنظام العمل والعاملين دراسة استطلاعية لاراء عينة من المديرين في الشركة
Sildenafil, tadalafil, and vardenafil are phosphodiesterase type 5 enzyme (PDE-5) inhibitors used for the treatment of male erectile dysfunction. This present study aims to investigate 55 herbal products indicated for men’s sexual health from the Malaysian market for adulteration of PDE-5 inhibitors and analogues. The screening and identification of 20 PDE-5 inhibitors and analogues in herbal products of various forms (powder, capsules, tablets, and pastels) were conducted using gas chromatography–electron impact-mass spectrometer (GC-EI-MS). The analysis has shown that 19 herbal products were adulterated with PDE-5 inhibitors and analogues. Unique ion fragmentations and the presence of molecular
... Show MoreThe bile salt hydrolase gene (bshA), encoding bile salt hydrolase enzyme (EC 3.5.1.24) from probiotic isolate Lactobacillus acidophilus Ar strain which is responsible for assimilation cholesterol were studied in the present work. About 801 bp in length DNA fragment of Lb. acidophilus Ar strain was amplified by PCR techniques. Two restriction sites (PstI/SacI) were added to each end of that fragment for manipulation of DNA during cloning. Amplified fragment inserted into pJET1.2\blunt end vector and pMG36e vector respectively. pJET1.2\blunt end vector is overexpression plasmid for E. coli MC1022, and pMG36e vector is a shuttle vector which is able to replicate in both E. coli and lactic acid bacteria. The resulted constructs were named as pJ
... Show MoreThis study seeks to identify the role that the leadership trend plays in the management of health institutions in Iraq and its impact on improving the quality of the health service provided by analyzing some opinions of affiliates working in the Iraqi health sector where a survey list was used as a main tool for collecting primary data, as it was subjected to this analysis ( 60) of the medical staff, of whom (40) are doctors and (20) are affiliated with the rank of assistant physician, and (60) members of the administrative cadre have undergone their various job ranks and administrative specializations (department manager, auditor, observer, accountant, statistician, secretary). Reliance on statistical software (spss) in data ana
... Show MoreIn their cross-sectional study, Al-Rubaye et al studied the extent of vitamin D (VD) deficiency/ insufficiency, factors affecting its degree, and the adverse outcomes of the altered VD status among a group of mothers and their neonates from Baghdad, Iraq. They found that 96.6% of the mothers had VD deficiency/ insufficiency compared to 86.4% in their neonates. Maternal VD levels and neonatal weights were significantly correlated with neonatal VD levels. We believe that the study results need to be revised. This is based two points listed in this letter to editor
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreVideo copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show More