بعد مرور عام واكثر على ظهور فيروس كورونا والعالم يواجه تسونامي تلك الجائحة التي تكاد تعصف بالوجود البشري برمته لذا اخذت البشرية على عاتقها مواصلة الجهود والابحاث للوصول الى علاج طبي يتم من خلاله مواجهة هذا الفيروس او التقليل من آثاره التي تهدد الحياة البشرية بالموت المباشر دون الاصابة، مما نتج عن تلك الجهود مجموعة من اللقاحات التي تبنتها الشركات العالمية المسؤولة الا ان الضرورة القصوى التي نتجت عنها تلك اللقاحات وضيق الوقت وما يتطلبه من الاسراع لإنقاذ ارواح الناس خلق في داخلهم تخوفاً من الاقبال على اخذ ذلك اللقاح او التطعيم مما وجه انظار الدول الى ضرورة ايجاد صيغ قانونية تحدد الجهات المسؤولة عن الاضرار التي تصاحب هذا اللقاح مما يبعث في داخل الافراد الثقة في تلقي تطعيم ( كوفيد - 19 )، ومن بين تلك الدول السباقة بذلك الاهتمام القانوني هو العراق حيث نظم المشرع العراقي مجموعة من الاحكام التي بينت المقصود ببعض المصطلحات الطبية ذات الصلة الى جانب تحديد الجهات المسؤولة عن توفير واستخدام الاداوت الخاصة بعملية تلقي تطعيم (كوفيد -19) ومدى تلك المسؤولية مما يتطلب ضرورة البحث بتلك الاحكام وبيان مدى كفايتها في توفير الامان القانوني للأفراد.
Abstract:
The research aims to achieve defining the concept of environmental quality and associated costs. Studying the impact of environmental quality costs on the performance of economic units. Measuring the relationship between environmental quality and environmental performance of the units. Where the research problem is represented in the weak awareness of some economic units of the importance of environmental quality costs and their impact on evaluating environmental performance, and this leads to neglecting environmental considerations and not improving environmental performance effectively, which negatively affects the en
... Show MoreSummary of the research Family violence, its causes and effects on society (women and children). Search Goal: The current research aims to identify: 1. Causes of family and social violence (for children and women). 2. How to process. research importance : Domestic violence is a major and devastating problem that has a negative and direct impact on children in particular and women or mothers in general. The problem of domestic violence is linked to many factors and individual, social, economic, psychological and environmental variables, which makes one theory that claims to be inaccurate. It is difficult to understand the nature of family violence without linking it to some of the concepts related to it. The negative effects that may lead
... Show MoreMuch has been written about Baghdad in the history books and documents ,about the Origin of its call , Reality ,history ,peoples ,Rulers and all that have passed since the beginning of creation and so far...
RNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreThe design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreThe Impact of Intellectual trends on the nature of the Economic Structure of Iraq
Abstract
The developments of technology and information that is sweeping the world based on the factors of pressure on the accounting profession in general, and the authors of the accounting information. That becouse the makers of administrative decisions have become in need of new information fit and the environmental situation of the new competition and try to enter new markets,
... Show MoreThis paper presents the motion programming and control of omni-directional mobile robot through the process of building and programming a small robotic platform with secondary design criteria of modularity and simplified control. This is accomplished by combining the positive aspects of several different robotics platform ideas. The platform is shaped like an equilateral triangle with a servo motor, sensors, and omni-wheel, controlled by a PIC microcontroller.
In this work the kinematics, inverse kinematics and dynamic module for the platform is derived. Two search algorithms (the wall-following search and the “most-open-area” search) is designed, tested, and analyzed experimentally.
Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.