Provisions and controls on the disposal of public funds between Sharia and law
Research Summary
That money is the foundation of life and one of the most important reasons for the reconstruction of the land, and God is the owner
The real value of this money, God has borrowed some individuals on public money, and people
They are charged with preserving it, since it is beneficial to them all, without anyone taking it
To himself, and the guardian is charged by God to protect this money and aggression
Because of its power, authority, various organs and public servants of the province
Upon him; Because the assault on public money by employees and others in the organs of the state
And exploitation of their jobs and this threatens social security, economic and political.
The spread of assault on public money is due to several reasons, including:
Sane values, low level of loyalty to work, and lack of commitment to honesty
Honesty and integrity, mastery of work and love of self, lack of good example, and rampant
Favoritism, and personal pleadings, as well as the exclusion of Islamic law from the application,
And be satisfied with the laws that may not be appropriate for the Muslim community.
The images of the attack on public money by many people, including:
Theft, and embezzlement
For personal purposes, and the appointment of staff on the basis of nepotism, favoritism and partyism,
And profit from the job ... etc. On money
In all its forms, forms and causes, and established limits and controls to ensure protection
Effective for public money.
Theoretical and experimental investigations of free convection through a cubic cavity with sinusoidal heat flux at bottom wall, the top wall is exposed to an outside ambient while the other walls are adiabatic saturated in porous medium had been approved in the present work. The range of Rayleigh number was and Darcy number values were . The theoretical part involved a numerical solution while the experimental part included a set of tests carried out to study the free convection heat transfer in a porous media (glass beads) for sinusoidal heat flux boundary condition. The investigation enclosed values of Rayleigh number (5845.6, 8801, 9456, 15034, 19188 and 22148) and angles of inclinations (0, 15, 30, 45 and 60 degree). The numerical an
... Show MoreAccurate prediction of river water quality parameters is essential for environmental protection and sustainable agricultural resource management. This study presents a novel framework for estimating potential salinity in river water in arid and semi‐arid regions by integrating a kernel extreme learning machine (KELM) with a boosted salp swarm algorithm based on differential evolution (KELM‐BSSADE). A dataset of 336 samples, including bicarbonate, calcium, pH, total dissolved solids and sodium adsorption ratio, was collected from the Idenak station in Iran and was used for the modelling. Results demonstrated that KELM‐BSSADE outperformed models such as deep random vector funct
The study aimed to evaluate Glucagon-Like Peptide-1 levels in Polycystic ovary syndrome (PCOS) infertile female with Diabetes Mellitus (DM) and compare the results with control group, also, to find the correlation for GLP-1 with Luteinizing hormone (LH), Follicle stimulating hormone (FSH) and LH/FSH ratio that may be used in prediction atherosclerosis in these patients. The study included nineteen women with age ranged (30-40) years and BMI ranged between (30-35) Kg/m 2. Subjects were divided into two groups: group (1) consist of (45) females as a healthy control and group (2) consist of (45) infertile females with PCOS and DM as complication. Fasting serum glucose was determined by using commercial kits (Biolabo SA-France); LH, FSH, prolac
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More