This study seeks to clarify the adequacy of the current legal texts - procedural and objective - to respond to our situation under Corona and whether it needs to modify or develop treatment for this general exceptional circumstance or to avoid it, and the appropriateness of the idea of force majeure or emergency circumstance or (the idea of foreign reason) to face the consequences or effects of Corona on the rules of litigation and the formation of the court and its jurisdiction and procedural appointments and litigation procedures and appeal and judgment and its implementation in order to maintain and implement the public order that interferes with the mechanisms and measures taken It is intended and has legal and judicial implications for the legal stay and the exceptions that are included. All this is done through an analytical, rooting and comparative approach to access alternatives and proposals in this regard.
The study aimed to identify the degree of availability of design Thinking Indicators in The content of the Arabic Language Curricula at the secondary stage in the Syrian Arab Republic; to achieve the goal of the study. The researcher used the Descriptive Approach based on the analysis method according to the Cognitive Theory. The study tools consist of a list of Design Thinking Indicators and a Content Analysis Tool. The researcher completed the Validity and Reliability procedures for the tools. After applying them, the results of the study resulted in the following: Greater Interest than other sub-skills. The results also showed a Divergence of care for the sub-skills and the Difference in their recurrence rate, and the Omission of some
... Show Morethe contemporary Arab scholars deal with semiotics as an approach that helps them understand the texts, its meaning, and its structural functionalism . that’s why every now and then we find some
studies and researches using semiotics as an approach in study and comparatives, some of them even used the semiotic approach in analyzing old and new texts, while others think that semiotic holds and important place in critical approaches .
even though some of them considers semiotic just a trend of fashion this really didn’t lessen the value of semiotic as a scientific and procedural approach in literary and media studies as well as in analyzing literary and journalistic texts. for this reason it is considered as an important approa
The properties of capturing of peristaltic flow to a chemically reacting couple stress fluid through an inclined asymmetric channel with variable viscosity and various boundaries are investigated. we have addressed the impacts of variable viscosity, different wave forms, porous medium, heat and mass transfer for peristaltic transport of hydro magnetic couple stress liquid in inclined asymmetric channel with different boundaries. Moreover, The Fluid viscosity assumed to vary as an exponential function of temperature. Effects of almost flow parameters are studied analytically and computed. An rising in the temperature and concentration profiles return to heat and mass transfer Biot numbers. Noteworthy, the Soret and Dufour number effect resul
... Show MoreThe aim of this work is to survey the two rows resolution of Weyl module and locate the terms and the exactness of the Weyl Resolution in the case of skew-shape (8,6)/(2,1).
In this article, we investigate the peristaltic flow of a Powell-Eyring fluid flowing in an asymmetrical channel with an inclining magnetic field through a porous medium, and we focus on the impact that varying rotation has on this flow. Long wavelength and low Reynolds number are assumed, where the perturbation approach is used to solve the nonlinear governing equations in the Cartesian coordinate system to produce series solutions. Distributions of velocity and pressure gradients are expressed mathematically. The effect of these parameters is discussed and illustrated graphically through the set of figures. To get these numerical results, we used the math program MATHEMATICA.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
A Multiple System Biometric System Based on ECG Data