Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
BACKGROUND: Transverse fractures of the patella are important fractures with a wide variety of subtypes, the common incidence in the age group of 20–50 years. Surgical interference aims to achieve a perfect alignment of the joint surface, in addition to rigid fixation of the fracture for early re-habitation and early movement to retain the extensor mechanism of the knee joint. AIM: The aim of this study was to compare the radiological and functional outcomes of the displaced transverse patella fracture in adult patients treated by ORIF using tension band wiring versus cannulated screws with wiring. METHODS: A prospective analytic comparative study was conducted in Al-Kindy Teaching Hospital/Baghdad/Iraq for 18 months from Apr
... Show MoreIn this study, we focused on the random coefficient estimation of the general regression and Swamy models of panel data. By using this type of data, the data give a better chance of obtaining a better method and better indicators. Entropy's methods have been used to estimate random coefficients for the general regression and Swamy of the panel data which were presented in two ways: the first represents the maximum dual Entropy and the second is general maximum Entropy in which a comparison between them have been done by using simulation to choose the optimal methods.
The results have been compared by using mean squares error and mean absolute percentage error to different cases in term of correlation valu
... Show MoreThis study aimed to measure the accounting conservatism and the lemited factors which affected on it in the annual financial reports of insurance companies which listed on the Amman Stock Exchange during the period from 2005 to 2016, these factors were represented by firm age, firm debt and firm size.
Using the market value model (MV) To book value ( BV) Beaver and Ryan (2000) The level of the accounting conservatism was measured. The study found that the insurance companies which are listed on the ASE exercise the accounting conservatism when they were preparing financial reports. And when conducting a process of the test of the affected of the factors (The age of the
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreFree Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show MoreThe enemies of religion are still following the approach of undermining the Islamic faith in various ways through the diversity of methods of smear campaigns by raising suspicions to obliterate the Islamic identity and threaten security and stability of social life under the Islamic religion in Islamic societies, as we find that they have employed the doctrine of atheistic thought in order to distance people from the path of truth, distort the features of religion, destabilize psychological security and family stability, and thus destroy societal security by questioning the tolerant faith at times, and by raising suspicions at other times.
Hence, this research came to review the legal duty that requires Islamic scholars to protec
... Show MoreNations witnessed since its existence a state of wills conflict as a result of the intersection and intertwining of interests, through which it sought to achieve its goals and objectives, and this has often led to direct military conflicts and countless wars, and witnessed the entry into global wars in which humanity lost millions of lives and losses .Despite the great changes in the international arena, especially in recent decades, the conflict of wills has not ceased, although some of its features and forms have changed, and it has become more complicated after the withdrawal of this conflict to international organizations and bodies, including the Security Council. It is mandated under the Charter of the United Nations to wor
... Show MoreThe study aimed to test the hypothesis of Caldor to estimate the relationship between industrial production and GDP growth in Iraq using with Integration Framework and to determine the causal relationship in the short and long term using the error correction vector model for the period 1990-2016. the results showed a long-term equilibrium relationship between GDP and industrial output, while Ganger causality tests showed a causal relationship in the long run of GDP to output Subliminal thus illustrated the extent of the recession suffered by the industrial sector, which is supposed to be the driving force of the economy and the development and expansion of the productive base of the industry, so this study recommends attent
... Show MoreEnsuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac
... Show MoreThe aim of the research is to explain the nature of the relationship between the dimensions of the strategic recovery of the service represented by (compensation, speed of response, apology, initiative (defining the problem) and the strategic goals of the company represented in (profitability, growth, community service, employee satisfaction) in the National Insurance Company, it has been approved The questionnaire as a tool to collect data and information from the sample of (58) who are in (department manager, M. department director, division official, unit official) and the statistical program (spss) was used in calculating (arithmetic mean, standard deviation, coefficient of variation, coefficient of Correlation, t-test, varia
... Show More