The main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from the characteristic and the variety of the tasks in the states activities and the increase of the state's interference as well as the necessity of not losing the states in comes except in the right goals and for building the country, thus there should be an efficient administrative body to undertake the operation of executing the general budget which is a legal act committed by the executive authority represented by the cabinet as a corrective year approach. • A dilemma of the efficiency of these censorious bodies appears with the spreading of the financial and administrative corruption in addition to the loss of the funds of the state and its loss without tangible results of this censorship due to effects and political budgets of the authority parties as well as the retreat of the capacity over ruling the law and the absence of the general role in the ministry of justice because it represents people and to complete the censorious role in referring to courts those who are found guilty .. the pluralism in the censorious devices and the interfering in its job and its weakness to stop corruption needs to review the role of it and to think of consolidating and to survive the role of the financial censorship and to let it perform its job.
Understanding of in-situ stress profiles and orientations plays a vital role in designing a successful hydraulic fracturing treatment. This paper is an attempet to examine the effect of lithology and in situ stress on geometery of hydraulic fractures. A hydraulic fracturing design simulator software called FracproPT with various capabilities for designing most of hydraulic fracture was used for simulate and optimize the hydraulic fracturing. For studying purpose, three different cases of stress gradient contrast between different formations are considered in this study (0.4, 0.5 and 0.75 psi/ft). The results obtained from the simulator showed that lithologies surrounding the pay zone have an effect on the fracture
... Show MoreThe fouling depositions of crude oil stream were studied theoretically in a shell and tube heat exchanger to investigate the effect of depositions on the heat transfer process. The employed heat exchanger was with steam flowing in the inner tubes and crude oil in the shell at different velocities and bulk temperatures. It is assumed that fouling occurs only on the heated stream side (crude oil). The analysis was carried out for turbulent flow heat transfer conditions with wide range of Reynolds number, bulk temperature and time. Many previously proposed models for fouling resistance were employed to estimate a new model for fouling rate. It is found that the fouling rate and consequently the heat transfer coefficient were affected by Rey
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThe aim of this study was to identify the effectiveness of using generative learning model in learning kinetic series on rings and horizontal bar in artistic gymnastics for men ,Also, the two groups were better in learning the two series of movements on the rings and horizontal bar . The experimental method was used to design two parallel groups with pretested and posttest .The sample included third graders at the College of Physical Education and Sports Sciences - University of Baghdad ,The third class (d) was chosen to represent the control group that applied the curriculum in the college, with (12) students per group. After conducting the tribal tests, the main experiment was carried out for (8) weeks at the rate of two units per week di
... Show MoreBreast cancer is a disease in which cells in the breast grow out of control. CD200 is a cell surface glycoprotein expressed on many cells, it belongs to the immunoglobulin family (Ig) and have a great role in the regulation of inflammation in autoimmunity. CD200 is the ligand for CD200R1 receptor. To determine if serum level of CD200 and its receptor CD200R1 can be used as a diagnostic and prognostic marker in patients with breast cancer.This case control study was carried out at Oncology Teaching Hospital – Medical city in Baghdad. Six groups were enrolled, four groups were confirmed with breast cancer stage (I, II, III and IV), fifth group (benign) and sixth group was control (healthy individual). Serum is divided to me
... Show MoreThis work has been carried out to develop national drug product contains 2.5mg/ml clonazepam as oral drop; it is used for the treatment of epilepsy in infants and children.
Several formulations were prepared using oral drop base, flavor, buffer, sweeteners and preservatives. Selection of best formula relied solely on physic-chemical testing of samples.
Stability study was conducted on the product for six months at different temperatures to determine the expiration date and the best storage conditions.
From the study we obtained an oral drop of good clear solution. The expiry date calculated to be not less than 2 years.
Deep submicron technologies continue to develop according to Moore’s law allowing hundreds of processing elements and memory modules to be integrated on a single chip forming multi/many-processor systems-on-chip (MPSoCs). Network on chip (NoC) arose as an interconnection for this large number of processing modules. However, the aggressive scaling of transistors makes NoC more vulnerable to both permanent and transient faults. Permanent faults persistently affect the circuit functionality from the time of their occurrence. The router represents the heart of the NoC. Thus, this research focuses on tolerating permanent faults in the router’s input buffer component, particularly the virtual channel state fields. These fields track packets f
... Show MoreIn the field of residential community planning, one of the appropriate places to study the mutual influences between man and the environment, away from the influences, concepts and mechanisms of contemporary planning theories are isolated environments in rural areas, and the marshlands in Iraq represent one of these models. These areas still retain the planning patterns of residential communities for thousands of years. This research attempts to conduct a descriptive study of traditional settlement patterns, which relied on the capabilities of the surrounding areas to provide planning and architectural solutions based on the environmental factor. Establishing such a clear framework for these impacts can help in any future interventi
... Show MoreThe research in the variables of the political process and government stability tried to show the impact of the political process on political stability first, and then on government stability second, given that the political process that was established in 2005 was aimed at achieving legitimacy, and its most prominent tools are elections, leading to achieving political stability, including government stability. The issue of governmental stability is one of the important issues in Iraq, but it has not been achieved, as a result of several factors, including problems in political action, as the political process has not succeeded in leading Iraq to stability.