This study will develop and implement the International Identification Card (IIC) to multi users (M-1). The IIC can be used in several methods such as an IC card, Passport, driver’s license, Visa card, Security Information system, Business part, all information about individuals/persons. The Smart Identification Card Technology (SICT) system will be using several new technology categories/tools such as Information Technology, Management Information Technology, Database management, internet service, Bluetooth service, NFC and mobile calling service. The target of SICT is to increase the efficiency of IC card to know the details for all citizens and foreigners from any country regardless their nationalities. What this means is the citizen’s national and/or international security check can be identifiable, accessible from anywhere and anytime without time and/or location considerations. Therefore, any criminal behavior records and any other required checks can be accessed by the governments and authorities. The advantages of implementing this technology are to reduce the cost and time of history checkup of the person and aggregate Multi-IDs to one SICT. This new technology system will result a magnificent change, this will includes the person's (passenger's) passport information as well. Therefore, passengers can use their IIC for check in and out processes instead of using traditional passport. This new implementation of technology will assist the governments and citizens around the world without any delay in the service securely.
The study of the future of the international system currently appears, according to scientific data and existing facts in light of the emergence of international actors from non-states and international informal institutions, to be heading towards a non-polarity system and this trend is fueled by many variables to reduce polarity, and it is expected in the future that the international system will turn into a non-polarity.
Human witnessed over the centuries many of the important issues faced by the international community was centered on human rights in general and the persecution of refugees, especially according to many forms may be directly or indirectly leaves behind economic crises, social and humanitarian push world countries to rethink the mechanisms and the feasibility of developing agreements and laws and the role of international and regional organizations to protect peoplerefugeestatus.
Deontic modality expresses what is necessary or possible according to the norms of morality and laws of community. It is a cover term for those cases where modal auxiliaries used to express notions like ''obligation'', ''prohibition'' and, ''permission''. Deontic modals are basically performatives, having the ''so-be-it'' component of directives in that the speaker directs the behavior of the addressee to get things done. The present study identifies the use of deontic models in international contracts to prove that there are major pragmatic strategies employed in writing them. To achieve the aim of the study, a modified model of Danet’s (1980) and Trosborg’s (1995) in accordance to Searle (1969) is used to analyze 16 texts selected fro
... Show MoreEverywhere carriers incur a measure of liability for the safety of the goods. Carriers are liable for any damage or for the loss of the goods that are in their possession as carriers unless they prove that the damage or loss is attributable to certain excepted causes. Damaged and lost items can unfortunately be a common problem when shipping freight. Legal responsibilities arise due to loss or damage during transit while cargo is in their care. This study intends to investigate the nature of the liability of the maritime carrier when this liability is realized, and the extent to which it can be paid or disposed of given the risks realized from the transportation process, which may result in damage or loss of the goods, and the damag
... Show MoreThe amicus curiae is one of the judicial procedures adopted in many judicial and legal systems around the world, under which a person who is not a party to the case, and without having a personal and direct interest in it, intervenes to draw the court’s attention to many factual and legal aspects
Abstract
The purpose of the research is to determine how much do the external auditors’ qualifications in Iraq match the international requirements? And determine the necessary and priority requirements that the auditor should have in order to adapt with the changes in the community and the profession. The research partially focuses on comparing international institutes curriculum requirements with the local institutes’ curriculum requirements. Furthermore, it compares examinations of local students with the questions of these institutes and compares the requirements of these institutes to continuing vocational education with the local, as well as analyzes and presents the questionnaire results to find out the necessa
... Show MoreThis study was aimed to one of the most prevalent causes for endodontic treatment failure is the presence of Enterococcus faecalis bacterium within teeth root canals. To achieve successful treatment, it is so important to study E. faecalis behavior. The aim of study was to investigate biofilm production and antibiotic sensitivity of E. faecalis isolated from root canals. Results showed isolation of E. feacalis (65%) of samples, identified by specific gene by PCR technique. Most isolates were sensitive to Imipenem and resistant to Erythromycin, Clindamycin, Tetracycline and Trimethoprim. Strong biofilm production was detected among 29.5% of highest antibiotic resistant isolates. The results may indicate that infected root canals with E. feac
... Show MoreThis research has been prepared to isolate and diagnose one of the most important vegetable oils from the plant medical clove is the famous with Alaeugenol oil and used in many pharmaceuticals were the isolation process using a technique ultrasonic extraction and distillation technology simple
Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no
... Show More