When exercising their authority in the jurisprudence, judges are subject to a set of restrictions that they must adhere to, as they do not want their jurisprudence to be accepted and welcomed by law practitioners in general, and legal scholars in particular, and in contrast to it, the arrows of criticism and defamation will extend to that jurisprudence, and then they will have to reverse them . Perhaps the most important of those restrictions imposed on judges is their observance of justice between the parties to the lawsuit through their lack of bias for one of the parties at the expense of the other, in addition to their observance of public order and public morals, as well as their observance of the legal texts that they work under its umbrella, and last but not least their respect for the rights and fundamental freedoms of individuals As stipulated in international conventions as well as national laws.
In this paper, we have employed a computation of three technique to reduce the computational complexity and bit rate for compressed image. These techniques are bit plane coding based on two absolute values, vector quantization VQ technique using Cache codebook and Weber's low condition. The experimental results show that the proposed techniques achieve reduce the storage size of bit plane and low computational complexity.
Understanding sedimentation behavior and its transport capacity in the Tigris River is of significant importance owing to the detrimental consequences caused by it. This study investigates the sediment amounts transported along the reach of the Tigris River in Baghdad. The CCHE2D model which is a common tool developed by the National Center for Computational Hydrological Science and Engineering (NCCHE) was applied to investigate the flow pattern and sediment amounts within 7 km reach. The model was initially calibrated and validated under steady-state conditions at the Sarai gauging station (upstream) and its performance was evaluated around the Abu Nawas water treatment plant (downstream). The result shows that the water surfac
... Show MoreElectronic banking services appeared as a result of laying the foundations for the application of electronic automation in the banking field, and despite the clear expansion in its adoption and implementation as an inevitable necessity imposed by international and national developments, its application was not ideal according to the level that was expected to occur after the abandonment of traditional banking services, which produced some risks Which is evident in the absence of a legal system, whether at the level of proving and authoritative electronic banking services such as electronic signature, Or at the level of protecting the confidentiality of these services and ensuring that they are not exp
... Show MoreFolic acid modulates several disorders in humans, pregnancy mostly because of the mitochondria-rich placenta, is a condition that favors oxidative stress.Transitional metals, especially iron, which are particularly abundant in the placenta, are important in the production of free radicals. Adenosine deaminase (ADA), an enzyme essential for the differentiation of lymphoid cells, has been used for monitoring diseases with altered immunity. In the present study we investigated the effect of regular and irregular administered folic acid in the first and second trimester of pregnancy to be compared with non-pregnant women ,and also the effect of regular and irregular using of folic acid supplement on oxidative stress parameters an
... Show MoreDiabetes mellitus can be defined as a metabolic disorder disease .Complication of diabetes are due to diabetic nephropathy .This study was done in vitro to study the effect of different concentrations of erlotinib inhibitor ( tyrosine kinase inhibitor) on electrolyte levels (MgâºÂ²,CaâºÂ²,Naâº) in sera of Iraqi patients with newly diagnosis type2 diabetes and diabetic nephropathy in addition to find the best percentage inhibition for utilizing different concentrations from erlotinib (6.97x10â»â·, 9.30x10â»â· ,1.16x10â»â¶,1.39x10â»â¶ ,1.62x10â»âµ )molar on electrolyte levels . This study was conducted in The National Diabetes Ce
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground:Periodontal diseases are infectious diseases in which periodontalpathogens trigger chronic inflammatory and immune responses. Interleukine-6 is a multifunctional cytokine playing a central role in inflammation and tissue injury.The aim of the study IS to determine the level of Interleukin-6(IL-6) in saliva of patients with chronic periodontitis compared to healthy subjects. Materials and Methods:The total subjects of the present study is 60, divided into 3 groups; 20 patients with chronic periodontitis with pocket depth(PD ≥4 mm)(group I), 20 patients with pocket depth(PD <4 mm) with clinical attachment loss (group II), and 20 healthy controls with pocket probing depth (PPD ≤ 3 mm) without clinical attachment loss (g
... Show More