The issue of insurance against unlawful risks raises a jurisprudential and judicial debate between two opposing trends: the first considers coverage of these risks invalid due to their impact on public order or morals, while the second—which this research analyses—calls for the possibility of covering these risks in specific circumstances, based on contractual considerations in accordance with the principle that the contract is the law of the contracting parties, and based on the obligation to compensate the harmed third party—the victim—who has no connection to the unlawful act. In this context, our research highlights that contractual considerations can justify coverage of some unlawful risks, provided that the goal is to achieve a legitimate interest that does not conflict with the fundamental principles of public order. This view has found resonance in some comparative judicial applications, particularly in France and the United States. It also aims to demonstrate the legitimacy of this approach, which prioritizes the achievement of insurance justice by ensuring that victims fully obtain their rights, even if the source of the harm is an unlawful risk. This research also seeks to demonstrate that absolute adherence to the prohibition of coverage for these risks may lead to unfair consequences for others, especially in cases where the victim cannot avoid the harm, which justifies the intervention of insurance companies to bear the burden of compensation.
Since the beginning of the second decade of the twenty-first century, Saudi Arabia tried to pursue an open foreign policy towards many countries in the Horn of Africa, especially with Ethiopia and Somalia, due to the geostrategic qualities that these two countries possess.Despite the development of Saudi foreign policy towards Ethiopia and Somalia, it was soon affected by the tension after the events that the Gulf states went through, that is, the Qatari crisis with Saudi Arabia,especially after most of the countries of the Horn of Africa adhered to a policy of neutrality towards the Gulf-Gulf crisis.
Thus it is expected that despite the geographical proximity and the historical, economic and political relations between Saudi Ara
... Show MoreThe aim object of research is to show the computerized services library of Salahaldeen University in Erbil city in Iraq, so the research treatment all side of library such as building, location ,staff ,finance, resource collection and services ,we refer to. problem which face library such as administration and finance through the using Of case study method, reference source ,meeting , online comment and data record .The study focus develop in library departments, users services, management ,staff, the resource collection, building and location.
The study ending with many results and recommendation to develop the library services by using modern Information system to all users inside and outside the university and link them with other
Abstract
This study aims to identify the social and psychological abuse towards elderly people by others, to identify the difference of social and psychological abuse towards elderly by others according to the variable of gender (male and female). Additionally, to identify the difference of social and psychological abuse towards elderly by determining the one who is responsible of abusing (son, daughter, spouse, etc.). To achieve this aim, the researcher designed a scale to identify the social and psychological abuse towards elderly by others. The results showed that this sample exposed to psychological abuse by different sides due to lacking of powers. Besides, the result showed that there are no signifi
... Show MoreThis paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a third order linear time
... Show MoreIncreasingly, public organizations in the federal state are required to work together, as well as to work with others to achieve their objectives. In Iraq there are two levels of organizations, including federal and local, and these organizations have been forced to work for many years in an environment in which the responsibility for service delivery is shared between policy makers and service providers, and between local governments and the federal government. It is sometimes difficult to manage the relationship between these organizations (federal and local) and do not always provide the best possible outcome of this relationship. This paper reviews how to manage the relationship between local administrations and
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreIllegal distribution of digital data is a common danger in the film industry, especially with the rapid spread of the Internet, where it is now possible to easily distribute pirated copies of digital video on a global scale. The Watermarking system inserts invisible signs to the video content without changing the content itself. The aim of this paper is to build an invisible video watermarking system with high imperceptibility. Firstly, the watermark is confused by using the Arnold transform and then dividing into equal, non-overlapping blocks. Each block is then embedded in a specific frame using the Discrete Wavelet Transform (DWT), where the HL band is used for this purpose. Regarding the method of selecting the host frames, the
... Show MoreIran Regional and Foreign Security Policies Gulf. The long history of regional and other conflicts which their severity increased because of appearance of modern states and cultural and lingual ancient differences resulted in deep feeling of doubt and suspicion between Iran and its Arab neighbors .Meanwhile the two sides have several interests common points , the moist important is the strategic and commercial interests . The fears and objective procedures based on the continuing evaluation of Iran abilities and needs direct security policies in internal and foreign affairs concerning the world in Gulf specially.
The increasing availability of computing power in the past two decades has been use to develop new techniques for optimizing solution of estimation problem. Today's computational capacity and the widespread availability of computers have enabled development of new generation of intelligent computing techniques, such as our interest algorithm, this paper presents one of new class of stochastic search algorithm (known as Canonical Genetic' Algorithm ‘CGA’) for optimizing the maximum likelihood function strategy is composed of three main steps: recombination, mutation, and selection. The experimental design is based on simulating the CGA with different values of are compared with those of moment method. Based on MSE value obtained from bot
... Show More