The husband’s discipline of his wife is a right prescribed by the Sharia, but it is conditioned discipline with conditions that make this discipline intended to preserve the family institution from disintegration and scattering, so the Islamic Sharia entrusted the husband, the guardian of the family, with the task of disciplining the disobedient and disobedient wife and deviating from the family’s values and constants of mutual respect and obedience in what is good. And a sense of responsibility. This discipline goes through three sequential stages, starting with exhortation and dialogue, passing through abandonment in the beds, and ending with beating. As for the sermon, it is a quiet dialogue followed by a threat of abandonment. As for desertion, it is desertion, either verbally or desertion from sexual intercourse, and desertion is only in the marital bed. As for the beating, it is a light, harmless beating, and it may be described as a moral and psychological beating. It is intended exclusively for reform, so it is not permissible to resort to any means of discipline unless it is intended to return the wife to the institution of the family and to live together in a decent life based on affection and respect. The Iraqi legislator adopted the opinion of Islamic jurisprudence in the Iraqi Penal Code and made discipline a right of the husband in Article 41 thereof. As for the legislator in the Kurdistan region, the wife was excluded from the discipline clause. It seems that what the legislator followed in the Iraqi Penal Code is more likely.
As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show MoreBackground:- Cholesterol is high in ascetic fluid due
to malignancy and other causes of exudates.
Objective:-To use cholesterol as a marker to
differentiate between exudative and transudative
ascetic fluid and to compare that with other routine
parameters.
Methods:-Twenty eight patients were included in this
study 17 females with mean age of 41.9 years, 11
males with mean age of 48.2 years. The patients were
divided in group I suspected transudate, and group II
suspected exudate according to history and clinical
examination.
Ascetic fluid samples were sent for total protein,
albumin, and cholesterol measurement blood samples
were sent for serum protein and albumin measurement.
Results:-In this
Exploitation of mature oil fields around the world has forced researchers to develop new ways to optimize reservoir performance from such reservoirs. To achieve that, drilling horizontal wells is an effective method. The effectiveness of this kind of wells is to increase oil withdrawal. The objective of this study is to optimize the location, design, and completion of a new horizontal well as an oil producer to improve oil recovery in a real field located in Iraq. “A” is an oil and gas condensate field located in the Northeast of Iraq. From field production history, it is realized the difficulty to control gas and water production in this kind of complex carbonate reservoir with vertical producer wells. In this study, a horizont
... Show MoreResults of exposure larvae of the most important predator in the integrated pest management , the green lacewings, Chrysoperla carnea (Stephens) to various densities of fig moth Ephestia cautella eggs showed increasing in the number of consumed prey at decreasing rate of increasing prey density where curve slope consumption decreased gradually until leveling off. These specifications concurred with type II functional response that predators appear towards varied densities of its preys ,that was confirm by logistic regression between the proportion of prey eaten in relation to prey offered . Third larval instars of the predator showed attack rate (a) of 4.85. This was greater than the second larval instar (3.58). Handling time (Th) per
... Show MoreBackground: fixed orthodontic appliances deleterious influence on gingival health is well documented. Association between weight status and gingival health is presented in many studies. This study aimed to evaluate how early the impact of fixed orthodontic therapy on patients` gingival health, and if there are differences of that impact among different weight status groups. Materials and Methods: Sample consisted of 54 patients (25 males, 29 females; age limits are 16 -18 years) going under the course of treatment with fixed orthodontic appliance. Patients were categorized according to their Body Mass Index (BMI) into 3 weight status groups considering WHO charts in 2007 (underweight, normal weight, overweight and obese), then determinat
... Show MoreThe mutagenic effect of some crucifers widely consumed Lepiduim sativum (Garden cress) and Arugula (Eruca sativa) was studied in comparison to carrot (Daucus carota), using bacterial mutagenic system composed of three bacterial isolates; (Bacillus spp)G3 (Arthrobacter spp)G12, and (Brevibacterium spp)G27 ,. Treatment of isolates with plant extracts led to reduction in survival fraction (Sx)at different levels except that Aurgula extract did not show any inhibitory effect in isolates G12 and G27. Crucifers extracts induced streptomycin resistant mutants in G12 at higher level than G3 , but not in G27. No resistance to rifimpacin was detected in all isolates.
Background: The combination of thermoplastic nylon resin materials and auto polymerizing resin is necessary in some situation for repair and adjustment. This study evaluated shear bond strength between thermoplastic nylon material (flexible) and auto polymerizing acrylic resin subjected to holes and silica coated layer. Materials and Method: Forty five (45) specimens were prepared from flexible acrylic bonded to auto-polymerizing acrylic resin and divided into three groups according to the surface treatments as follows: Group A: 15 specimens of flexible acrylic bonded with cold-cure acrylic by holes. Group B: 15 specimens of flexible acrylic bonded with cold-cure acrylic by silica coated layer. Group C: 15 specimens of flexible acrylic bon
... Show MoreDetecting and subtracting the Motion objects from backgrounds is one of the most important areas. The development of cameras and their widespread use in most areas of security, surveillance, and others made face this problem. The difficulty of this area is unstable in the classification of the pixels (foreground or background). This paper proposed a suggested background subtraction algorithm based on the histogram. The classification threshold is adaptively calculated according to many tests. The performance of the proposed algorithms was compared with state-of-the-art methods in complex dynamic scenes.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More