Police play an important role in any society. Where they maintain public order by stopping and deterring crime and bringing criminals to justice. In order to achieve these objectives, they have certain means of law (search, arrest, use of force that may be lethal in some cases). However, such means may be misused in a way that harms members of society such as (Exceeding the Scope of a search warrant, violation of privacy of individuals, False Imprisonment, Excessive use of force, Sudden Deaths in custody, Sexual Assault and Harassment, Failure to respond for Domestic violence calls), which raises the civil liability of police officers and their agencies for such damage. Police officers may even abuse their characteristics even outside official working hours by misusing their uniforms, identifying insignia, or the weapons they carry. This research highlights some of the fault made by police officers, that raise their civil liability in the light of American law and Iraqi law, as well as the position of the American judiciary (a rich judiciary in civil cases against police officers), which demonstrates the depth of constitutional culture The legal status enjoyed by members of the American society in terms of their knowledge of their constitutional rights, and the prosecution of those who attempt to violate them even if they are policemen. The opposite is true in Iraq, where the civil action against the police is almost too few and even rare, which demonstrates the lack of constitutional and legal culture among members of Iraqi society. Although the constitutional and legal texts in the two countries are almost identical.
A free convective heat transfer from the inside surface of a uniformly heated vertical circular tube has been experimentally investigated under a constant wall heat flux boundary condition for laminar air flow in the ranges of RaL from 6.9108 to 5109. The effect of the different sections (restrictions) lengths placed at the exit of the heated tube on the surface temperature distribution, the local and average heat transfer coefficients were examined. The experimental apparatus consists of aluminum circular tube with 900 mm length and 30 mm inside diameter (L/D=30). The exit sections (restrictions) were included circular tubes having the same inside diameter as the heated tube but with different lengths of
... Show MoreNine new compounds of 2-amino-5-chlorobenzothiazole derivatives were synthesized. These new compounds were formed through the reaction of 2-amino-5-chlorobenzothiazole 1 with ethyl chloroacetate and KOH, which gave an ester derivative 2, followed by refluxing compound 2 with hydrazine hydrate to afford hydrazide derivative 3. The reaction of compound 3 with CS2 and KOH gave 1,3,4-oxadiazole-2-thiol derivative 4, and then the reaction of compound 2 with thiosemicarbazide to produce compound 5 then treated it with 4%NaOH led to ring closure to provide 1,2,4-triazole-3-thiol derivative
... Show MoreThis study assessed the quality of hand-dug drinking water sources in Eku and its environs at Eku I, Samagidi, Eku 2, and Okuechi, using the weighted arithmetic water quality index method. Water samples collected from hand-dug wells at these locations returned values for analyzed parameters. Temperature 26 – 30(⁰C), dissolved Oxygen (D.O) 5.2-8mg/l, biological oxygen demand (BOD) 5.2-8(mg/l), Electrical Conductivity (EC) 77-119(µS/cm), Total suspended solids were (TSS) 20000-120000(mg/l), pH 5.31-7.09, Phosphates 2-9.2(mg/l), Alkalinity 28-160(mg/l), Turbidity, 0.02 -0.19(NTU) Total coliform 2 -48 (cfu/ml) and fungal count 1-502. Variations in the values of these parameters were only significant for phosphate, alkalinity, and turb
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
On Saturday, May 13, 2023, a glorious day was engraved in the history of Al-Kindy College Medical Journal as it is the day of indexing the journal in the Scopus Database Journals. The journal has paced a strenuous journey to make that achievement.
Accounting disclosure is the main means and effective tool for communicating business results to users in support of their decisions, especially those with thought and specialization from academics and professionals in the field of accounting and auditing about the importance of accounting disclosure and transparency in financial reports.
Contingent liabilities represent commitments based on the occurrence of one or more events in the future to confirm the value due, the party entitled to it, the maturity date, or to confirm the existence of the obligation itself, and therefore they should not be recognized as a contingent liability i
... Show MoreObjectives: Determine the age and gender distribution of children who experience diabetes mellitus (DM) under
the age of 15 years and the presence of some associated factors that might be a predisposing factor for the
disease including obesity.
Methodology: A cross-sectional study was conducted at diabetic clinic in Children Welfare Teaching Hospital
in Baghdad City during 2006. The study sample included diabetic children less than 15 years of age. Data were
taken from the patients' record and by direct interview with the patients' parents. Information included
demographic data, as well as past history of the patient and his/her family relative to diabetes and other immune
diseases.
Results: Data analysis showed t
Most companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak
... Show MoreThe research aims to know The Effect Of Flexible Grouping Strategy and Three Step Interview strategy on achievement of the history material among student of the first literary class, The Researcher used the experimental design of the two experimental groups and the control group and with post test, researcher group (a) represent the experimental group taught according the Flexible Grouping Strategy , and Division (c) to represent the second experimental group which studied according Three Step Interview strategy and Division (b ) to represent the control group taught in the traditional method, the number of students (99) students of (33) female students in each division. T
... Show More