Praise be to God, prayer, and peace be upon the Messenger of Allah and his God and his companions. The field of the judiciary to prove or invalidate some cases in the field of proof of descent and attachment to the plaintiff or exile, and other legal and judicial issues, especially in this era where the spread of previously unknown evidence, such as DNA, which was discovered in 1953, and the genetic fingerprint discovered 1984, blood analysis and a Saliva, sweat, poetry, etc. in the field of forensic evidence, in forensic medicine or medical expertise, it can be used to identify the killer, or verify his identity, using all the evidence in the scene, such as a point of blood or sweat, and the like So, as well as to prove the lineage is unknown by analyzing his blood and stature with the blood of the defendant.
This paper is an attempt to help the manager of a manufactory to
plan for the next year by a scientific approach, to maximize the profit and آ provide optimal آ monthly quantities of آ production, آ inventory,
work-force, prices and sales. The computer programming helps us to execute that huge number of calculations.
Abstract
This research attempt to explain the essential aspects of one important model in management of Bank risks , that is (stress testing) , which increase the concentrate on it resulting the negative affects of Global financial crisis that it accuar in 2008 to study the application possibilities in iraqian banks to enhancing the safety and financial soundness Becuase the classical tools in Risk management don’t give clear image on Banks ability in facing risks, hence the Basel committee on Banking supervision focusing in agreement of Basel 2,3 on stress testing when it doing the internal capital adequacy assessment process (ICAAP) .
To achieving the reseach obje
... Show MoreThis study aimed to identify the employment of the social networking platform «Twitter» in the 2016 presidential campaign led by the Republican candidate, Donald Trump; and analyse his tweets through his personal account on «Twitter» for the period from: 10/ 8/2016 to: 11/ 8/2016 which represents the last month of the election campaign.
The study belongs to the type of descriptive studies using the analytical method through an analysis index that includes sub-categories and other secondary categories. The research has adopted the ordinary unit of information material (tweet) as an analysis unit for this purpose.
... Show MoreПредметом нашего исследования является вводные слова и их значения в современном русском языке. И прежде чем углубиться в нашу научную работу нам было необходимо определить понятие вводных слов и их функция и место в системе русского языка. По словам В. Г. Лебедева и Л. С. Тюревы "Вводные слова вводятся в предложении, чтобы выражать отношение говорящего к высказываемой мысли, оценки ее содержа
... Show MoreThis paper aims to discuss and analyse the role and importance of implementing industrial Policy to promote industry and enhance economic development in developing countries. The paper discusses the economic justifications for using industrial policy as well as the criticisms leveled against it, for this purpose it analyses the ideas of two different approaches to industrial policy. The first held by the neo-liberals in the USA , who oppose the use of industrial policy and emphasise the role of the market in attaining economic development. The second, represented by many economists who support the use of industrial policy to promote industry and accelerate economic development, they justify their stand by pointing to the negative
... Show MoreThis study deals with the role that social work profession plays in all its fields to reduce social extremismat home, or school or within society. The study aims to: examine the historical roots of social work in the Iraqi society, investigate the objectives of the developmental role of social work, review the theories of social extremism, its characteristics, and causes, and to analyze the developmental role of social work to limit social extremism. To meet the objectives of the study, a descriptive analytical approach has been adopted. It involves using the social sampling survey method, i.e., a questionnaire tool in the University of Baghdad community-College of Media. The sample was randomly selected to include (100) students from th
... Show MoreThe study aims to build a proposed training program for school leaders in the Sultanate of Oman on the planning practices of the Kaufman model in light of the needs and challenges of reality. It also aims to identify the challenges facing school leaders in practicing the stages of strategic planning. To achieve these objectives, the study adopted the descriptive approach due to its suitability to the nature of the study. A questionnaire was used to collect the needed data. The study sample included (225) individuals from school principals, their assistants and senior teachers in post-basic education in the Sultanate of Oman. After processing the data statistically, the study concluded that the reality of planning practices for school lea
... Show MoreObjective: To find out any gender differences in health promoting behaviors for a sample of students attending Institute of Technology/ Baquba. Methodology: An analytical, cross-sectional study conducted randomly for a sample of students attending Technical Institute/ Baquba, during the period from 10th November 2015 to 10th April 2016. A questionnaire used to collecting data, this questionnaire was consisted from two domains related to health promoting behaviors including (Dietary domain and domain of some daily life activities like sleep duration, rise time, bedtime and walking period per week). The
This study aim to identify the concept of web based information systems since its one of the important topics that is usually omitted by our organizations, in addition to, designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.
This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat
... Show More