One of the Kurdish scholars who have research on the doctrinal issues of the author of this brief message that we are about to achieve; to bring it out better and in order to preserve the Islamic heritage, and revive what can be revived after being close to death by staying in libraries here and there, out of reach of hands, carrying dust Years of forgetting and marginalization, and this letter is the papers in the door of the divorce entitled his author "Iqdar al-dream for those who did not sign divorce commoner," and the name is evident the name, and the intention of the author through writing, where he wrote it to answer some of the knowledgeable among the public at the time So they decreed that there was no divorce from commoners D who do not know the linguistic meaning of the word divorce, although they knew that the word put to break the marital relationship !! There is no doubt that this is an odd fatwa that is bizarre about seriousness, but accused the writer of these writers for taking bribes against those misleading fatwas; He succeeded in demonstrating what he wanted so that they destroyed their structure and overturned their course and direction.
The research aims to apply one of the techniques of management accounting, which is the technique of the quality function deployment on the men's leather shoe product Model (79043) in the General Company for Textile and Leather Industries by determining the basic requirements of the customer and then designing the characteristics and specifications of the product according to the preferences of the customer in order to respond to the customer's voice in agreement With the characteristics and technical characteristics of the product, taking into account the products of the competing companies to achieve the maximum customer satisfaction, the highest quality and the lowest costs. Hence, the importance of research has emerged, which indicat
... Show MoreThis research aims to numerous risks to the portfolio of the insurance company that arise from practicing the activity in general, and the risks arising from insurance contracts in particular, and what is the role of the company in the disclosure to help users (such as owners) to understand and concentration of risks in the financial reporting and identifying movable risks size to reinsurers that may affect the solvency of the portfolio and makes them at a given moment required to fulfill the obligations towards policyholders outweigh the financial capacity, which leads to stumble or bankruptcy.
So I sought this research is to identify the extent of the obligation to disclose the accounting for this risk and the extent of their i
... Show MoreObjective : To assess the efficiency for some disinfectants against the microorganisms isolated from
the wards of newborn and premature babies in Educational Baghdad Hospital .
Methodology :This study had done from 1\8\2014 untile 1\9\2014, we had selected three types of
disinfectants ( Incidine , Bleach and Microbac Forte )which were used for disinfection in the wards of
newborn babies at Educational Baghdad Hospital to assess their effect against the microorganisms
isolated from these wards and study the mixed affect of these disinfectants againt same
microorganisms .
Results : The results of the present study showed that there is affect of the different concentrations of
the used disinfectants against the micro
Background: Bone augmentation techniques are commonly employed in medical fields. This biomaterial system must be readily available, easily applicable by minimally-invasive technique and able to release an osteoinductive growth factor. Such a system will be able to engineer new bone formation locally at the site of injection. Hyaluronic acid has osteogenic potential that can be exploited not only for repairing bone defects but also for providing transplantable bone for the reconstruction of a variety of bone defects. The aims of this study were to evaluate the effects of Hyaluronic acid gel on bone healing by immunohistochemical estimation of transforming growth factor -beta 3 in experimental and control groups. Materials and methods: Thirt
... Show MoreThe problem of the research lies in special motor abilities training programs like the balance that positively affect coordination between the nervous system and muscles. These training programs did not get enough attention from athletes especially young athletes; their training was restricted to physical abilities like strength, speed, and endurance instead. The research aimed at designing an apparatus for developing athletes’ balance in national centers for gifted/ ministry of youth and sport so as to provide a measurement for coached in this field. The results showed that the designed apparatus have a positive effect on developing the subjects’ balance in boxing and basketball athletes.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreMany of researchers have written about social responsibility and business strategy and competitive advantage, and they have given particular attention to the relationship between economic and social responsibility , but what is missing in this aspect is how the economic units that use their core competencies to advance social responsibility initiatives so that they can achieve a significant competitive advantage and create value for it ?
The current research aims to verify the view that "the economic and social objectives in the long term is not contradictory in nature but complementary objectives essential", as well as make sure that the s
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More