Preferred Language
Articles
/
Ohfqso0BVTCNdQwCaRlE
Compensation through Guarantee Funds in the Promotion of Extremist Ideas
...Show More Authors

Compensation is one of the most discussed topics in the arena of civil law that requires research About solutions to the damages that arise from the promotion of extremist ideas, which were imposed by the developments taking place in society and the increasing escalation of accidents and their increasing risks, which now threaten individuals and their property on a daily basis in large numbers, as the injured party always seeks to require quick compensation from the person responsible for the damage that satisfies his desires and removes the effects of the damage caused, The importance of compensation increases if the violation affects a person’s physical integrity or his right to life, which is the highest right recognized for humans in the modern era. If in the past, the injured person was able to bear the damages that befell him alone if he was unable to prove the fault of the person responsible for the damage, given that error is the only basis for obtaining compensation, the situation has changed today, and public sentiment has begun to view the damage that befell the injured person as a violation of the legal balance. Between the injured person and the perpetrator of the acts, and that justice requires compensation for him, in addition to the development of awareness among the citizens themselves in most countries, such that the injured person no longer accepts to be a victim under any “act of God” or “written” justification, but rather feels that he has the right to obtain appropriate compensation

View Publication
Publication Date
Tue Jan 01 2013
Journal Name
Communications And Network
Link and Cost Optimization of FTTH Network Implementation through GPON Technology
...Show More Authors

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
NUMERICAL INVESTIGATION OF DEVELOPING LAMINAR FLUID FLOW THROUGH RECTANGULAR ANNULUS DUCT
...Show More Authors

The laminar fluid flow of water through the annulus duct was investigated numerically by ANSYS fluent version 15.0 with height (2.5, 5, 7.5) cm and constant length (L=60cm). With constant heat flux applied to the outer duct. The heat flux at the range (500,1000,1500,2000) w/m2 and Reynolds number values were ≤ 2300. The problem was 2-D investigated. Results revealed that Nusselt number decrease and the wall temperature increase with the increase of heat flux. Also, the average Nusselt number increase as Re increases. And as the height of the annulus increase, the values of the temperature and the local and average Nusselt number increase.

View Publication
Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Al-kindy College Medical Journal
Through the Eyes of Healthcare Providers, the Necessity and Challenges of Implementing Medication Reconciliation at Hospital Discharge: A Qualitative Study
...Show More Authors

Background: Medication reconciliation can include medication reviewing and providing counseling and a list of all the medications during every transition of care. Objectives: to explore in-depth the perspectives of Iraqi physicians and pharmacists regarding the necessity of medication reconciliation at hospital discharge and identify the possible benefits and challenges that could face its implementation. Subjects and Methods: A qualitative study included semi-structured interviews with pharmacists and physicians working at a public teaching hospital in Iraq. The interviews were conducted face-to-face from February to March 2023. Thematic analysis was used to analyze the qualitative data generated from the interviews. Results: In th

... Show More
Preview PDF
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Financial reporting of grants and assistance in government units according to IPSAS23
...Show More Authors

Abstract: -

The purpose of the research is to present and discuss the concept of grants and aid, with the study and analysis of the role and importance of grants and assistance on the activities of In government units, and then to determine the factors of obtaining grants and assistance, and the importance of providing accounting information in order to enhance the financial reporting of grants and assistance. The accounting system of the government and determine the areas of shortness, taking into account the failure to issue a local accounting base to determine the basis of accounting measurement and disclosure of grants and assistance to guide, and this is the starting point of the current research and so has been intr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Responsibility of the external auditor to detect the activity result of the public construction companies in accordance with the going concern principle: دراسة تطبيقية في شركة الفاروق العامة للمقاولات الإنشائية
...Show More Authors

The audit profession today gets an increasing interest by the financial , economic and legal contemporary societies , because of the importance of the technical & neutral auditor’s opinion to the financial reports beneficiaries in order to enable them making their investment decisions , but some of them whom suffered damage or loss when they made that decisions according to the mentioned financial statements which consolidated with auditor’s report , exposed the function to a responsibility and credibility crisis in addition to missing the trust especially at the latest years. They always ask why or what is the reason that cause the auditor didn’t giving us any warning signs about the economic mater for that companies.

View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
Human right rule in self-defense And its prohibitions in Islamic jurisprudence
...Show More Authors

God, may He be glorified and exalted be He, has given every human being the right to life and a dignified life, and has warned against transgression against any of its sanctities without a legitimate right. No one, regardless of his status or authority, can deprive a person of his rights that the Sharia came to preserve, and whoever does that has declared all people to war, as all humanity is in solidarity. In raising the hand that is simplified to harm a person and oppress him unjustly and exalted in the land.
If this is the case, the Sharia came to establish the right of people, groups and individuals, to defend their sanctities, preserve their security, recover their usurped rights, repel the aggression of the aggressors, and oppre

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Detecting the effectiveness of two tools for detecting the talented from their teachers' points of view
...Show More Authors

Education specialists have differed about determining the best ways to detect the
talented. Since the appearance of the mental and psychological measurement movement, some
scholars adopted intelligence ratios as a criterion to identify the talented and others went to
rely on the degree of academic achievement. Each of these two methods has its own flaws and
mistakes and a large number of talented children were victims of these two methods.
Therefore the need to use other scales for the purpose of detection of talented children
appeared because they provide valuable information which may not be obtained easily
through objective tests and these scales are derived from consecutive studies of gifted andtalented children

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Educational values when Imam Shafie i through his hair
...Show More Authors

In this research was the study of the educational values ​​when Shafei, contained in hair Shafi'i, and that what the role of these values ​​in the education of generations, and the possibility of their application in the educational curriculum. Find addressed Shafei life and his time. The values ​​derived from his hair, as well as quoting from the Koran and influenced by it, which is evident in the hair, governance and eating Alomthal.okzlk Find the importance of this thought in modern education, so as to realism and ease of application. It is the search results, the Shafi'i put thought educationally integral based on the Koran rise to the level of theory. Find and conclusions: that education in its present situation

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 20 2018
Journal Name
Al-academy
Ways to stimulate children's skills through contemporary theatrical discourse
...Show More Authors

In order to activate theatrical discourse aware of the changes imposed by the nature of the contemporary child in terms of stimulating the social skills that achieve a technical and aesthetic convergence between him and theatrical presentation by investing the fact of the existence of the child and its potential in the weaving of stories, and folk in the imagination, and simulation of what corresponds with the characters and icons interact with them through technologies In the light of this research came the following address: (ways to stimulate the skills of the child through a contemporary theatrical speech) where the researcher seeks to delineate the importance involved in the discourse of theater through ways to reach the pillars con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref