The international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.
The main aim of the research is to identify the impact of the application of IFRS for SMEs on optimizing the utility of information for financial reports. To answer the questions and test the hypotheses of the research, researchers relied on the descriptive analytical approach. First, the researchers clarified the theoretical aspect through previous studies, and then they analyses d the results of the applied study by testing the hypothesis using the SPSS.
A questionnaire was distributed after evaluation and arbitration by a number of specialists on selected sample. The sample of 120 respondents consists of general managers, department directors, head of departments, accountants, auditors and financial controllers working in the
... Show MoreRegulations of changes in Sharia policy
Variables include jurisprudential rulings that may be subject to change, alteration and interpretation, depending on the mujtahid’s view of the ruling, or changing it and switching to another view, and the variables are the crucial issues that befell the nation of Islam. It was not neglected by Islamic legislation, but rather the setting of controls that took into account in every incident the norms, interests and purposes.
Wars represent one of the most serious threats to the world order; It is considered a violation of international laws and norms, and humanitarian principles. From this point comes the study of the importance of the topic entitled (The Future of the Russian-Ukrainian war and the extent of its Reflection on the security of Eastern European countries after the year 2022). This study is based on reviewing future possibilities (scenarios) of war. The Russian-Ukrainian war, which was launched by the Russian government led by Russian President Vladimir Putin in February 2022, is still ongoing at the time of writing this research. This chapter includes three possibilities (scenarios). The first possibility deals with the development of the war t
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show Moreتم تحضير ثلاث معقدات جديدة Ni (II)و Cu (II) و Zn (II) باستخدام الليكند المحضر الجديد من تفاعل حامض مالونيك ثنائي هيدرازايد مع 2-بيريدين كربوكسالديهايد. حيث شخصت المعقدات لمحضرة وكذلك الليكند باستخدام تقنيات مختلفة مثل FT-IR و UV-Vis و Mass و 1H-NMR و 13C-NMR وتحليل العناصر CHN و تقدير محتوى الكلور والموصلية المولارية والحساسية المغناطيسية والامتصاص الذري لتشخيص هذه المركبات. لكل معقد محضر جديد من النيكل والنحاس والزنك ، كشفت نتائج ا
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreThe enemies of religion are still following the approach of undermining the Islamic faith in various ways through the diversity of methods of smear campaigns by raising suspicions to obliterate the Islamic identity and threaten security and stability of social life under the Islamic religion in Islamic societies, as we find that they have employed the doctrine of atheistic thought in order to distance people from the path of truth, distort the features of religion, destabilize psychological security and family stability, and thus destroy societal security by questioning the tolerant faith at times, and by raising suspicions at other times.
Hence, this research came to review the legal duty that requires Islamic scholars to protec
... Show MoreIn this paper, the effect of changes in bank deposits on the money supply in Iraq was studied by estimating the error correction model (ECM) for monthly time series data for the period (2010-2015) . The Philips Perron was used to test the stationarity and also we used Engle and Granger to test the cointegration . we used cubic spline and local polynomial estimator to estimate regression function .The result show that local polynomial was better than cubic spline with the first level of cointegration.
Iraq suffers from lack of water resources supply because the headwaters of the rivers located outside its borders and the influence of upstream countries on the quantities of flowing water, in addition to the increase of pressure on available water as a result of population increase and not adopting the principle of rationalization where misuse and wastage and lack of strategic vision to treat and manage water use in accordance with the economic implications fall. This is reflected fallout on water security and subsequently on national and food security, while the issue of using water resources is development top priority in different countries in the world because of the importance of water effect on the security of indivi
... Show MoreDerivational word formation process is one of the most substantial linguistic procedures that solves many problems in the translation of the language new vocabulary and helps to comprehend the smallest language component that not simply semantically and structurally explain the elements of both Russian and Arabic but also enables translators to comprehend the derivational method procedures of both languages. It also reveals the structural aspects of translation equivalences, cognitive and semantic foundations of translation. The rapid development of languages and the appearance of a new vocabulary like ṭabaʿa "print → ṭābiʿat "printer", kataba "to write" → kātib → kātibat, rafaʿa "to raise" → rāfiʿat "a crane" d
... Show More