The direct military attacks in international armed conflicts may be against military targets Oalohdav and civilian objects alike, and so these attacks are legitimate, so do not result in an international responsibility, must be directed to the legitimate military targets without objects and civilian objects, and then may ask international law two conditions in these goals even can be counted legitimate military objectives may strikes her, the two effective contribution to military action, and to achieve a definite military advantage when directing attacks against it, and most of the development of international humanitarian law legal principles that limit the persistence of hostile forces to strike and attack targets and objects without distinction, so as not to attack these targets, damage to civilians and civilian objects, and perhaps the most prominent of these principles, the principle of distinction, which requires the distinction between civilians and combatants and between civilian objects and military dignitaries, and the principle of proportionality between the generated feature or desired investigation of the attack and damage and its expected impact on civilians and the environment
Background: Pilonidal sinus is a recurrence pathology that affects the gluteal area, cleft part of it. It affects many parts but mainly the sacral area and may present with various forms; from the asymptomatic cyst to severe infection in a form of painful abscess or sinus. The treatment of pilonidal sinus ranges from observation with good hygiene to excision of the sinus left wide incision. Recurrence may follow the excisional procedure and may need more operations. Many conservative ways had been used for the management of the sinus; laser (phototherapy) is one kind that may use. this paper aims to test the efficiency of the laser (diode 980nm) in the treatment of the sinus. material:
... Show MoreThe present study aimed to investigate the effect of re-operations engineering business in continuous improvement, as the rapid development of service activities generally private and the great diversity in the goals of its operations and programs of the university and the service has led to the increasing importance of re-operations engineering business as well as continuous improvement so began to study the relationship between the re engineering and continuous improvement of university service, and applied study on a sample of professors from the faculties of administration, economics and law. Find and reach to several conclusions, notably that the preparation of the teaching staff training sessions on how to use modern teaching
... Show MoreThe importance of this research comes from the possibility of achieving positive interaction between accounting and tax through the interest in setting accounting standards and adapting them to local tax legislation, as the adoption of the application of the international standard (IAS 12) for income taxes helps to measure and determine the base for income tax and may lead to an increase in the tax outcome. Through the reliance of enterprises on many accounting bases, and that the tax administration in Iraq depends on the element of personal judgment in determining the tax base, which leads to lack of objectivity in determining the tax outcome, as the impact of the accounting standard (IAS 12) on the tax base and tax outcome is one of th
... Show MoreAugmented reality technology is a modern technique used in all fields, including: medicine, engineering and education, and has received attention from officials in the educational process at present; The focus of this research is on the degree of use of augmented reality among field experience students in the project's optimal investment program for teaching staff and their difficulties, applied to a sample of 75 students, through a questionnaire prepared by the researcher as a tool to determine the degree of use, as well as difficulties. The researcher addressed the subject through two main axes to determine the degree of use, as well as the difficulties preventing teachers and learners from using this technique. The results of the rese
... Show MoreAbstract
This study aims at identifying the impact of the application of IFRS 15 "Revenue from contracts with customers on the quality of financial reporting, through application to faculty members in the accounting departments of Iraqi universities and auditors. The problem of the study was the multiplicity of accounting rules and standards Which deals with the issues of revenue recognition , as well as the lack of consistency of most of them with the common framework of financial accounting, which results in low quality of financial reporting in the current financial statements, where the formulation of one hypothesis was the lack of relationship of significant significance The application of IFRS 15 "Recognition of rev
... Show MoreThe bailment is one of the well-established legal systems of the English common law, and which included the distinguished characteristics of both the law of contract and the law of property. It is worth-mentioning that this legal system has acquired those common features of these two prominent legal systems, which form an important part of the common law. By the judicial precedents made by English courts. And these precedents have adopted two different and divergent attitudes towards the qualification of the legal nature of bailment in English law . Whereas the Iraqi civil law No. (40) of 1951 regulated the legal rules of the bailment, considering it as a real contract, the conclusion of which requires the availability of four basic elem
... Show MoreThe study aimed to evaluate injuries and economic losses which caused by rose beetle Maladerainsanabilis (Brenske) on ornamental and fruit plants as introduced insect in Iraq during 2015 and determine infested host plants in addition to evaluate efficacy of pathogenic fungi Metarhiziumanisopiliae (1x10⁹ spore/ ml) and Beauvariabassiana (1x10⁸spore/ ml) in mortality of insect larvae in laboratory and field.The results showed that the insect was polyphagous infested many host plants (20 host plant)Which caused degradation and dead the plants through adult feeding on leaves and flower but large injury caused by larvae feeding on root plants which caused obligate dead to infested plant, the percentage mortality of rose plants 68.6%, pear
... Show MoreAbstract
This research aims to identify the challenges faced by families of children with intellectual disabilities and to identify the impact of the challenges facing them on the mental health of their children with intellectual disabilities. Based on the following questions: What is the nature of the challenges faced by families of children with disabilities and how do these challenges affect the mental health of their children with intellectual disabilities? The study was conducted on a sample of four families of six children with intellectual disabilities, depending on the degree and type of disability. To achieve the study's objectives, the qualitative approach was used, Because of the importance of accessin
... Show MoreIncremental sheet metal forming is a modern technique of sheet metal forming in which a uniform sheet is locally deformed during the progressive action of a forming tool. The tool movement is governed by a CNC milling machine. The tool locally deforms by this way the sheet with pure deformation stretching. In SPIF process, the research is concentrate on the development of predict models for estimate the product quality. Using simulated annealing algorithm (SAA), Surface quality in SPIF has been modeled. In the development of this predictive model, spindle speed, feed rate and step depth have been considered as model parameters. Maximum peak height (Rz) and Arithmetic mean surface roughness (Ra) are used as response parameter to assess th
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More