Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
The aim of this research is to demonstrate the nature of the interactive relationship between the dimensions of the requirements of economic intelligence Represented by(Administrative and regulatory requirements, human requirements, and technical requirements) The strategic success of banks is represented by (Customer satisfaction, customer confidence, quality of service, growth) In three of the Iraqi banks own bank(Middle East Iraqi Investment, Al Ahli Iraqi, Gulf Commercial), The questionnaire was adopted as a tool for collecting data and information Of the sample (85) Who are they(Director of the Commissioner, M. Director Plenipotentiary, Director of Department, Director of Section, M. Section Manager, Division Officer, Unit Officer),
... Show More
The summery of my research marked by the judges judgment with his knowledge, I dealt with the definition of the judiciary, linguistically and idiomatically, and the importance and ligitimcy of the judiciary, as the judiciary is one of the most importunt pillars of lslam,inwhich justice as it proves the truth to its owners.
This paper studies the demonstratives as deictic expressions in Standard Arabic and English by outlining their phonological, syntactic and semantic properties in the two languages. On the basis of the outcome of this outline, a contrastive study of the linguistic properties of this group of deictic expressions in the two languages is conducted next. The aim is to find out what generalizations could be made from the results of this contrastive study.
This research discussed analytically based on intellectual institutions and theoretical landscape theater as artistic phenomenon depends on the compounds interacting overlapping mechanism visualization and dazzling Whatever the dilemma it a set of Alaqcar differ among themselves but in the result unit intellectual holds through difference and diversity between trends and styles and ways in design theorist theatrics Valashkalah on apparently formed through variations and different points of view through the philosophy of transformation and interpretation and assignment to offer privacy.
Valashkalah pulled in the design theorist theatrical as system training to arrange time and place and in line with the interpretation of speech text an
The typographic accomplishment is the most important means of cognitive communication and carries a message from the sender to the recipient which serves a certain objective functionally, economically and advertisingly.
The design of typographic accomplishment depends on two different techniques, the first is manual, which depends on the skill, training and individual achievement of the designer and his ability to design and produce typographic accomplishment with manual skill effects. The second one is the contemporary digitization which is represented by computers, programs and printers attached to them. The problem of the current resear
... Show MoreThe organizations, represented by its Management, are working hard in various ways to identify the environmental disturbances that occur in their environment and to investigate and follow up the movement of these disturbances and to respond to them through the decisions they make in an attempt to keep pace with the work and sustainability of their activities, including those decisions, marketing decisions taken by the environmental disturbulence in the market of the organization, the inability of these organizations to read the indicators of these disturbulence correctly displays their marketing effectiveness to vibration and decline in the negative.The current research is based on a fundamental problem that envi
... Show MoreThe objective of this study is to determination the content of some heavy metals (lead, cadmium, chromium) in colored tattoo stickers. twelve kinds of colored tattoo stikcers were collected from Baghdad markets, it was estimated heavy metals using atomic absorption spectrophotometer (Shimadzu A5000). The results indicated the concentrations of lead in all samples (1.61_1.00 mg / kg) and chromium in the three samples (0.85_0.97 mg / kg) while other samples are free of chromium , and cadmium. These elements are the components of printing inks and dyes in tattoo stickers, and this does not conform to the health and safety conditions for the packaging of food according to the organizations of the health and safety of
... Show MoreThe Transformation of environments surrounding human which called (place), formed an intermediate compresser in forming awareness pictures, human knowledge, culture and thought features, and changing the systems and contexts of human societies, which led to a change the rhythm of life as a whole. So according to that the place will be encodes according to these data for psychological connotations, lead to human sense of harmony with the place in different manner format, here the search problem lies when trying to detect how Iraqi artist deliberating with the place concept, wondering how to investing place in the contemporary Iraqi drawing within its reference dimension, and showing mechanisms from comparative study for the works of two a
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More