Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
Since 1990 internal combustion engines and variable systems has been considered as emission. Noise can be defined as undesirable sound, and in high levels it can be considered ahealth hazard. Large internal combustion engines produce high levels of noise. In many countries there are laws restricting the noise levels in large engine rooms and fixed applications. Locomotives engines have the minimum emission influence because of noise control techniques capability.
In this paper study on a single cylinder internal combustion engine was conducted. The engine works by adding ethanol to gasoline, at variable speeds, without adding ethanol, and with adding 10 and 20% ethanol in volumetric ratio. Using one sound insulator or two or with
... Show MoreMost reinforced concrete (RC) structures are constructed with square/rectangular columns. The cross-section size of these types of columns is much larger than the thickness of their partitions. Therefore, parts of these columns are protruded out of the partitions. The emergence of columns edges out of the walls has some disadvantages. This limitation is difficult to be overcome with square or rectangular columns. To solve this problem, new types of RC columns called specially shaped reinforced concrete (SSRC) columns have been used as hidden columns. Besides, the use of SSRC columns provides many structural and architectural advantages as compared with rectangular columns. Therefore, this study was conducted to explain the structura
... Show MoreAn experimental study is carried out on the effect of vortex generators (Circular and square) on the flow and heat transfer at variable locations at (X = 0.5, 1.5, 2.5 cm) ahead of a heat exchanger with Reynolds number ranging from 62000< Re < 125000 and heat flux from 3000 ≤ q ≤ 8000 W/m2 .
In the experimental investigation, an apparatus is set up to measure the velocity and temperatures around the heat exchanger.
The results show that there is an effect for using vortex generators on heat transfer. Also, heat transfer depends on the shape and location. The circular is found t
... Show Moreاحكام التركز الاقتصادي للمشاريع دراسة مقارنة
لقد نشا علم التحقيق على ايدي المحدثين المسلمين الذين وضعوا قواعد هذا العلم وظهرت مؤلفات عدة في هذا المجال ، لكن ما قام به الاقدمون لم يشكل قواعد علم مستقل بذاته ومنذ ظهور الطباعة بدأت حركة تحقيق المخطوطات ، وتعددت مناهج التحقيق فكان للمستشرقين منهجهم الخاص وظهر منهج التحقيق والاخراج الفني والعلمي للمخطوط .
The contemporary business environment is witnessing increasing calls for modifications to the traditional cost system, and a trend towards adopting cost management techniques to provide appropriate financial and non-financial information for senior and executive departments, including the Resource Consumption Accounting (RCA) technique in question, which classifies costs into fixed and variable to support the decision-making process. Moreover, (RCA) combines two approaches to cost estimation, the first based on activity-based cost accounting (ABC) and the second on the German cost accounting method (GPK). The research aims to provide a conceptual vision for resource consumption accounting, after Considering it as an accounting te
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreThe changes of the tectonic boundary locations between the stable and unstable shelf on different version of the tectonic maps of Iraq is discussed. It is found that the location of the boundary varies due to philosophy and the type of the geological parameters. It is used the stratigraphic, geophysical, structural, geochemical, hydrological and others information in delineating the boundary. The deep crustal structures obtained by using gravity data show that the boundary shifted toward the west by about 100 km in southern Iraq. According to the review, and when taking in consideration all the geological and geophysical parameters from the lower crust to the earth surface, it is believed that the boundary is not a line but it is a tecto
... Show MoreThe literature in general, such as the spanish literature as british literature presence lot of literary figures giant that managed its continuing work that leaves lasting impression and clear in all fields of literary world throughout history, among these writers giants can remind great writer spanish (Miguel de Cervantes) and the great british writer (William Shakespeare), this study is about them.
We can say that there are a lot of studies , works and gossip , whether literary or non- literary show how the close relationship that bound both Cervantes and William Shakespeare, although they did not meet personally never, it was not able to critics that the sweep of the differences and similarities that was between the two, becau
... Show More