Provisions and controls on the disposal of public funds between Sharia and law
Research Summary
That money is the foundation of life and one of the most important reasons for the reconstruction of the land, and God is the owner
The real value of this money, God has borrowed some individuals on public money, and people
They are charged with preserving it, since it is beneficial to them all, without anyone taking it
To himself, and the guardian is charged by God to protect this money and aggression
Because of its power, authority, various organs and public servants of the province
Upon him; Because the assault on public money by employees and others in the organs of the state
And exploitation of their jobs and this threatens social security, economic and political.
The spread of assault on public money is due to several reasons, including:
Sane values, low level of loyalty to work, and lack of commitment to honesty
Honesty and integrity, mastery of work and love of self, lack of good example, and rampant
Favoritism, and personal pleadings, as well as the exclusion of Islamic law from the application,
And be satisfied with the laws that may not be appropriate for the Muslim community.
The images of the attack on public money by many people, including:
Theft, and embezzlement
For personal purposes, and the appointment of staff on the basis of nepotism, favoritism and partyism,
And profit from the job ... etc. On money
In all its forms, forms and causes, and established limits and controls to ensure protection
Effective for public money.
A total of 72 individuals of genus Pristina were sorted from aquatic plant, Ceratophyllum demersum L., and filamentous algae collected from three sites on Tigris River at Baghdad including: Al-Sarafiya area (S1), Al- Jadiriyah area (S2), and Al- Za´afaraniya area (S3). Four species were identified including P. longiseta, P. aequiseta, P. proboscidea and P. foreli, with percentags of 51.7 , 36.4, 1.1, and 10.5 % respectively. The first two species found in all sites , while , P. proboscidea found only in S1 and P. foreli only in S2.
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreEichhornia, or water hyacinth represents a serious threat to potable water basins. This problem is materialized majorly in consuming large amounts of water and dissolved Oxygen that is necessary for aquatic life, and minorly in hindering water streams. Even there are limited trials to overcome such pests, none of them presents an acceptable solution economically and logically. Chlorine is a well-known biocide and broadly used in water industry. It could give a possible method to fight such weed. To investigate that, concentration-time plot should be introduced similar to any other microorganisms; especially, bacteria in water. In this work, various doses of Chlorine along various time
The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreA study of some mite species of alfalfa. wheat, and barley was conducted in central Iraq.
The mites were extracted using a tullgren funnel method. Twelve species were recorded. 10 of
them belong to suborder Trombidiformes and 2 belong to suborder Sarcoptiforms. Three
mites, Irnpar(pes hystricinus, Scutacarus longitarsus, and Rhizoglyphus echin opus are new
records for Iraqi mite fauna, and 11 are new host records in alfalfa soil.
The Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which tr
Wireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia applications. To
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show More