Preferred Language
Articles
/
jcois-2254
Variation in general formulas in the strength of its foundation and the reasons for the discrepancy
...Show More Authors

A legal discourse in the Qur’an and Sunnah is almost devoid of the use of one of the general formulas, and due to its frequent rotation in the tongue of the legislator, the formulas may overlap their members in apparently contradictory provisions, which makes the individual from the general members appear to the beholder to be covered by two contradictory provisions, and this research came to present what might happen to him The legal text interpreter of weighting between the two opposing texts is the strength of the generality that is established by the generality formula, so the two strongest formulas in the inclusion of its members outweigh the weaker of them and precede them, and the research decided that the formulas vary in the strength of the generality that it establishes. Decided by other formulas, then progressed in deduction if there is no way to combine them, and after deciding the aforementioned discrepancy in the strength of establishing the generality and the inclusion of individuals and its impact, the research turned to explaining the reasons for the differences in the formulas of generality in the strength of its foundation. The formula is in the comprehensiveness report, and it is proven that the formula is established linguistically and legally to benefit the public.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
3rd International Scientific Conference Of Alkafeel University (iscku 2021)
Exposure and etching time effects on the fission track density in CR-39 detectors using teeth samples
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Study the Oxidative Stress, Some Biochemical and Hematological Parameters in patients with agout at AL-Ramadi city
...Show More Authors

This study aims to study the effect of gout disease on complete blood picture and biochemical parameters and some non-enzymatic antioxidants, some tracing elements and lipid peroxidation ,in outpatients with gout disease at Al-Ramadi Teaching-Hospital ,Al-Razi Hospital and the study duration from Octo.2013-to May 2014.(50) blood samples were collected from patients with age groups (30-80 years) from both sexes (28 males,22 females),a (30) blood samples (15 males,15 females) were collected from normal individuals as a control group with age groups (27-75 years). Hematological measurement showed no significant differences in size compressed blood cells, the percentages in ( 45.15 +4.99 and 46.87+6.30) % in patient and control groups respect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 16 2024
Journal Name
Ecancermedicalscience
Prostate cancer across four countries in the Middle East: a multi-centre, observational, retrospective and prognostic study
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Comparative Development between the Asian Tiger Crisis and the Mortgage Crisis
...Show More Authors

Financial crisis is one of the topics that have attracted the interest of researchers in recently. The research focused on the issue of the crisis of the Asian Tigers and the mortgage crisis and comparing them in terms of causes and repercussions. It may meet most of the financial crises in many of its causes, factors, roots and results in the advanced and the developing countries. This crisis has its own pattern and its causes and nature and it is characterized by a crisis of cash liquidity and the collapse of many banks and declare bankruptcy and a sharp decline in stock prices and indices of the stock market and so far the common denominators among the causes but does not mean this There are differences between the financial c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Designing system cost for water pollution plants in mayoralty of Baghdad
...Show More Authors

          There is an increase in the need for cost accounting in all organizations and from different sectors to provide detailed information to the totals of financial accounting, first and help solve problems associated with inventory and analysis, tabulation and allocation of cost elements II and do the planning process and provide the necessary oversight and help to take the right decisions such as pricing decisions that need to Information cost accounting.
And suffer most of the non-governmental organizations from the lack of a cost accounting system provides information on the cost of service in these organizations and the department research sample circle v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Stability testing of time series data for CT Large industrial establishments in Iraq
...Show More Authors

Abstract: -
The concept of joint integration of important concepts in macroeconomic application, the idea of ​​cointegration is due to the Granger (1981), and he explained it in detail in Granger and Engle in Econometrica (1987). The introduction of the joint analysis of integration in econometrics in the mid-eighties of the last century, is one of the most important developments in the experimental method for modeling, and the advantage is simply the account and use it only needs to familiarize them selves with ordinary least squares.

Cointegration seen relations equilibrium time series in the long run, even if it contained all the sequences on t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Using dickey _ fuller expanded test for testing variables of investment function in Iraq
...Show More Authors

         To ascertain the stability or instability of time series, three versions of the model proposed by Dickie-Voller were used in this paper. The aim of this study is to explain the extent of the impact of some economic variables such as the supply of money, gross domestic product, national income, after reaching the stability of these variables. The results show that the variable money supply, the GDP variable, and the exchange rate variable were all stable at the level of the first difference in the time series. This means that the series is an integrated first-class series. Hence, the gross fixed capital formation variable, the variable national income, and the variable interest rate

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 02 2025
Journal Name
مجلة كلية القانون للعلوم القانونية والسياسية
Employment of Chinese Cyber Power in Regional Conflict Management Strategies The Case of Conflict with Japan After 2014
...Show More Authors

Abstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un

... Show More
View Publication
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Dentistry
New functional and aesthetic composite materials used as an alternative to traditional post materials for the restoration of endodontically treated teeth
...Show More Authors

Objectives To tailor composites of polyethylene–hydroxyapatite to function as a new intracanal post for the restoration of endodontically treated teeth (ETT). Methods Silanated hydroxyapatite (HA) and zirconium dioxide (ZrO2) filled low-density polyethylene (LDPE) composites were fabricated by a melt extrusion process and characterised using infrared spectroscopy (FTIR), differential scanning calorimetry (DSC) and dynamic mechanical analysis (DMA). The flexural strength and modulus were determined in dry state and post ageing in simulated body fluid and fractured surfaces analysed by SEM. The water uptake and radiographic appearance of the experimental composites were also measured and compared with a commercially known endodontic fibre

... Show More
View Publication
Crossref (3)
Crossref