Provisions and controls on the disposal of public funds between Sharia and law
Research Summary
That money is the foundation of life and one of the most important reasons for the reconstruction of the land, and God is the owner
The real value of this money, God has borrowed some individuals on public money, and people
They are charged with preserving it, since it is beneficial to them all, without anyone taking it
To himself, and the guardian is charged by God to protect this money and aggression
Because of its power, authority, various organs and public servants of the province
Upon him; Because the assault on public money by employees and others in the organs of the state
And exploitation of their jobs and this threatens social security, economic and political.
The spread of assault on public money is due to several reasons, including:
Sane values, low level of loyalty to work, and lack of commitment to honesty
Honesty and integrity, mastery of work and love of self, lack of good example, and rampant
Favoritism, and personal pleadings, as well as the exclusion of Islamic law from the application,
And be satisfied with the laws that may not be appropriate for the Muslim community.
The images of the attack on public money by many people, including:
Theft, and embezzlement
For personal purposes, and the appointment of staff on the basis of nepotism, favoritism and partyism,
And profit from the job ... etc. On money
In all its forms, forms and causes, and established limits and controls to ensure protection
Effective for public money.
The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ r
... Show MoreThe condition known as hypothyroidism is common in women, even in those who are fertile. The quantity and caliber of follicles present in the ovary at any one moment are known as the ovarian reserve. Individuals who are susceptible to a decreased ovarian reserve ought to have an assessment of their ovarian reserve conducted. The purpose of this research is to assess the impact of hypothyroidism on Iraqi women's ovarian reserve using Inhibin B hormone and hormone tests FSH, LH. There was no discernible variation in the average (±SD) age from (20 to 40) years of the patient group compared to the control group (p-value 0.08). However the mean BMI of the patients were statistically significantly different from the controls (P- value 0.006).Wom
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreThe recurrent somatic variations in
The aim of the study was to detect the frequency of R132 mutations in the
Potential pattern of foodborne bacteriophages against multidrug-resistant pathogens was a promising hygienic strategy module. Post-antibiotics era becomes evident due to emerging of dramatic episodes of infectious foci harboring biofilm and multidrug-resistant pathogens transferred mainly throughout food chain. Vancomycin-resistant enterococci (VRE) were struggling among these new infectious emergencies. Phenotypic epigenetic transit tolerant drift cascaded by genetic resistant shift behaviors of recalcitrant VRE forbidden clones recovered from mastitis cases in Cows from territories of Abu-Ghraib, Al- Fudhaliyah and Al-Sadrya in Baghdad ecosystem were combated by redirected lytic bacteriophages cocktails recovered from the same raw-milk ec
... Show MoreBackground: Toll-like receptors (TLRs) play a significant role in the activation of adaptive immunity and may have an essential role in the development of rheumatoid arthritis (RA). Objectives: To assess the gene expression of TLR4 in individuals with RA compared to healthy individuals. Methods: From July to December 2022. A total of 100 individuals were encompassed in the study, consisting of 50 individuals diagnosed with RA, of whom 42 were females and 8 were males, with an average age of 45.22 years. Additionally, there were 50 healthy control participants, 40 of whom were females and 10 were males, with an average age of 45.64 years. To assess the TLR4 transcript levels, blood samples were collected from each participant, and RN
... Show More