In view of the large profits made by the sex trade on the one hand, and the minor penalties imposed on the traffickers (brokers) compared with the severe penalties imposed on the drug trade and illegal weapons, on the other hand, this trade has become popular and spread in most countries of the world, and the cornerstones of this trade and A safe haven for them is hotels, especially luxury ones with international brands where their guests are rich and some may look for sex for money. Given the great physical and psychological damage to the victims, this research highlights the civil liability of hotels towards these victims in US and Iraqi law.In order not to limit the scope of the researcher theoretically, we have supported a number of cases that were presented to the US judiciary exclusively for the absence of such cases before the Iraqi judiciary (as we know). In conclusion, we have reached a number of conclusions and recommendations that we wish the Iraqi legislator to adopt
The anatomical features of leaves and stems of seven species belonging to five genera of the Papaveraceae family were studied, including: Fumaria bracteosa Pomel, 1875; Glaucium grandiflorum Boissier & A. Huet,1856; Hypecoum pendulum Linnaeus, 1753; Papaver fugax Poiret,1804; Papaver macrostomum Boissier & A. Huet, 1867; Papaver rhoeas Linnaeus, 1753 and Roemeria refracta de Candolle,1821. The results showed that the anticlinal cell walls of the adaxial surface were more thickened in P. fugax, H. pendulum, P. macrostomum and R.refracta, while it was thin in P. rhoeas. The cur
... Show MoreBackground: Apicoectomy and retrograde filling is indicated when conventional endodontic treatment is impossible or failed to achieve apical seal. The aim of this study was to evaluate the effect of ER: YAG laser on apical microleakage. Materials and Methods: Sixty extracted single-rooted teeth were used in this study. The roots were divided into six groups. Group 1: apicoectomy by fissure bur, and apical cavities prepared by round bur, then cavities were filled with MTA. Group 2: the roots preparations and fillings were the same as group 1, then the apical areas were treated by Er:YAG Laser. Group 3: apicoectomy by fissure bur, and apical cavities prepared by ultrasound retrotip and cavities were filled with MTA. Group 4: the roots prepara
... Show MoreIn this research study the effect of fish in alternating electrical properties at room temperature copper oxide membranes and fish prepared in a manner different thermal spraying chemical on a thin glass bases and heated
Abstract The Object of the study aims to identify the effectiveness of using the 7E’s learning cycle to learn movement chains on uneven bars, for this purpose, we used the method SPSS. On a sample composed (20) students on collage of physical education at the university of Baghdad Chosen as two groups experimental and control group (10) student for each group, and for data collection, we used SPSS After collecting the results and having treated them statistically, we conclude the use 7E’s learning cycle has achieved remarkable positive progress, but it has diverged between to methods, On this basis, the study recommended the necessity of applying 7E’s learning cycle strategy in learning the movement chain on uneven bar
... Show MoreThis study was aimed to examined effect of Januvia treatment on methionine synthases Meth and cystathionine B- synthase (CBS) in Iraqi patients type2 without treated and another group who taken Januvia treated in addition to diabetic patients with complication without treated with Januvia Also, to found the relationship between these parameters with BMI, FBS, HbA1C and Insulin levels. Firstly, the blood sampling date for this research between December and February 2019 - 2020. Blood sampling was withdrawn from 8:00 to 10:00 in the case of fasting of all substances . five milliliters of venous blood were collected by means of an antecubital venipuncture divided into two parts, one of which (2ml) was put in a tube containing anticoagulant fac
... Show MoreIn the current work various types of epoxy composites were added to concrete to enhance its effectiveness as a gamma- ray shield. Four epoxy samples of (E/clay/B4C) S1, (E/Mag/B4C) S2, (EPIL) S3 and (Ep) S4 were used in a comparative study of gamma radiation attenuation properties of these shields that calculating using Mont Carlo code (MCNP-5). Adopting Win X-com software and Artificial Neural Network (ANN), µ/ρ revealed great compliance with MCNP-5. By applying (µ/ρ) output for gamma at different energies, HVL, TVL and MFP have been also estimated. ANN technique was simulated to estimate (µ/ρ) and dose rates. According to the results, µ/ρ of all epoxy samples scored higher than standard concrete. Both S2 and S3 samples having h
... Show MoreCampsis grandiflora (Bignoniaceae) is a fast growing deciduous climber, the dried flowers have been used as a carminative, blood tonic, and febrifuge in Chinese traditional medicine. This plant has an anti-inflammatory, anti-oxidant, anti-depressant, and anti-bacterial effect; with a beneficial role in stagnant blood and endometriosis conditions. In this study, the detection of beta-sitosterol in the hexane extract of Iraqi C.grandiflora flowers was performed using thin layer chromatography (TLC) and high performance liquid chromatography(HPLC); while the isolation done by preparative layer chromatography then structure elucidation of isolated compound was done by FTIR and 1HNMR. Furthermore, assessment of th
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More