Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
The research aims to shed light on the importance of Natural gas as a National wealth is not being used optimally to be a financial resource is important to Iraq in addition to Oil, as well as could be used as an important Source of Energy, instead of burning gas is a waste of wealth and Contribute to the contamination of the environment. Research Reviews the importance of Natural gas, where is currently about a quarter of global energy consumption. Then deals with the reality of the gas industry in Iraq and winning because of the volume of waste incineration, which reached a rate (45%) of the gas Associated with oil, where Iraq is fourth globally in Terms of the amount of gas Burned. Finally, this paper discusses the future of n
... Show MoreThe technical development has significant effects on the mediator Alcinmatugrave, and TV originated mainly based on technical, with the development and the continuation of these technologies and the enormous impact on the level of the television picture, initially dramas in recent times approaching in the aesthetic composition of the film thanks to the employment of modern digital technologies, Montag was not only one of the cinematic elements that went into television thanks to technical developments analogue and digital, and which added the possibility of large processors in the picture, high-definition digital cameras that have led to dispense often for artificial lighting intensive imaging light available, as these cameras have helpe
... Show MoreSarcasm is conceders one patterns of undesirable communication, which causes social problems in humans relationships because of the contradictory verbal and nonverbal expressions is known sarcasm may defined , statements with intent to belittle others in different situations, dealing with the individual deliberately, to diminish the will or overwhelmed by the recipe stupid, which generate a reaction when a person listener, raising the intentions of ridicule and undermine it, and this may happen is different from the irony interest increased in sarcasm since the development of scientists "Watzlawick '" and Bevin "Jackson's" in 1967 theory interactive and considered the sarcasm one interaction patterns in the social relationship, which use
... Show More<p>Currently, breast cancer is one of the most common cancers and a main reason of women death worldwide particularly in<strong> </strong>developing countries such as Iraq. our work aims to predict the type of tumor whether benign or malignant through models that were built using logistic regression and neural networks and we hope it will help doctors in detecting the type of breast tumor. Four models were set using binary logistic regression and two different types of artificial neural networks namely multilayer perceptron MLP and radial basis function RBF. Evaluation of validated and trained models was done using several performance metrics like accuracy, sensitivity, specificity, and AUC (area under receiver ope
... Show MoreThe Theoretical bases of women's rights in Islamic shariate
This study examines the syntactic and semantic functions of the conscience of the chapter and the grammatical disagreement in its diagnosis between two famous linguists: Sibuyh and fur. Also, the conscience of the chapter occupies an important synthetic space in the construction of the Arabic sentence, identified by the Arab scientists, as linguistic analysts, have a strong sense of language and careful observation, they revealed it in their linguistic composition through the analysis of nominal structures, and found that it I come in specific syntactic patterns and grammatical templates that have certain characteristics that are unique to them because of the conscience of separation in their compositional space.
Background: White-spot lesion is one of the problems associated with the fixed orthodontic treatment. The aims of this in-vitro study were to investigate enamel damage depth on adhesive removal when the adhesive were surrounded by sound, demineralized or demineralized enamel that had been re-mineralized prior to adhesive removal using 10% Nano-Hydroxy apatite and to determine the effect of three different adhesive removal techniques. Materials and methods: Composite resin adhesive (3M Unitek) was bonded to 60 human upper premolars teeth which were randomly divided in to three groups each containing ten sound teeth and ten teeth with demineralized and re-mineralized lesions adjacent to the adhesive. A window of 2 mm was prepared on the bucca
... Show MoreThe electric energy is one of the most important renewable energies used in the world as it is the main source for sustainable development and economic development through its use in (production, transport and distribution), and in Iraq, the electric power sector has suffered from many problems and obstacles, as providing electric current is one of the most prominent difficulties and challenges That successive governments and residents have faced since the early nineties of the last century and are still ongoing, and that Iraq has all the climatic conditions for developing the work of the electricity system from renewable energies such as solar and hydroelectric energy, as well as gas fields that have become a Basic pillar of pow
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables