The issue of the prisoners' rights and the way of dealing with them is not just a minor or
primary issue according to the contemporary attitudes to deal with criminals, but it is a fatal
issue that goes with the development of life and comprehension of human rights. As the
criminal is considered as a human-being who can be reformed and qualified, according to the
aims of the contemporary social service the prisoner is regarded as an idle human source who
can be reformed, treated and qualified so as to make him participate to improve his family and
society in the end.
This study aims at reconstructing the prisons bases when applying the laws of the lowest
level of treatment through the research of oppositions, atti
ABSTRACT
The multi-drug resistant efflux pump is a glycoprotein pump whose function is to push foreign substances. The efflux pump is found in humans, animals. It also has wide-ranging properties in bacteria and fungi. They are found in all species of bacteria, and efflux pump genes can be found in bacterial chromosomes or mobile genetic elements, such as plasmids. The most sensitive function that leads to a global problem is its resistance to antibiotics in bacterial cells, which increases the ability to bacteria from becoming strong virulence factors that most or all antibiotics cannot kill. It also has othe
... Show More
The research aims to identify the most important areas of voluntary work available to women in society, stand on the most important controls that push women to work in voluntary areas in society. The research also seeks to stand on the most prominent obstacles to the voluntary work of women in society. The research contained four main chapters: Chapter I: Definition of research, Chapter 2: Objectives, areas, controls and effects of volunteer work, Chapter 3: Voluntary Work of Women in the Celestial Religions, and lastly, Chapter 4: Theories, Constraints, and Recommendations for Voluntary Work for Women.The researcher suggested several recommendations: 1-establishing a unit responsible for planning,
... Show MoreL-arabinose isomerase from Escherichia coli O157:H7 Was immobilized with activated Bentonite from local markets of Baghdad, Iraq by 10% 3-APTES and treated with 10% aqueous glutaraldehyde, the results refer that the yield of immobilization was 89%, and pH profile of free and immobilized L-arabinose isomerase was 7 and 7.5 and it is stable at 6-8 for 60 min respectively, while, the optimum temperature was 30 and 35°C and it was stable at 35 and 40°C for 60 min but it loses more than 60 and 30% from its original activity at 50°C for free and immobilized L-arabinose isomerase respectively. Immobilized enzyme retained its full activity for 32 day, but it retained 73.58% of its original activity after storage for 60 d
... Show MoreThe State company for vegetable oils industry one of the most dynamic
companies in the Iraqi economy and is one of the companies manufacturing(food) that takes astrategic dimension and production within the concept of food security, this as well as to reduce dependence on imports and operation of national manpower.This study aims to describe the performance of the State company for vegetable oils industry for the period (2003-2007) which was characterized by economic and security instability of the country and give an accurate picture of their efficiency and their capacity to produce during this Period.
AW Ali T, Journal of the Faculty of Medicine, 2016 - Cited by 1
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThe bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad
... Show More