This research presents a statistical study of radiation generated from communication towers in the Nineveh Plain region Baghdeda. The intensity of radiation energy was measured at 10 meters away from the communication tower in different locations, using a (1PC XH-901 Dosimeter/ Personal Dose Alarm / Radiation Detector, dosage rate: 0.01 μSv/h to 150μSv/h) to measure the amount of radiation at various times. Energy densities were measured and compared with standard limits provided by other authorities, such as the International Committee for Radiation Protection. Results were analyzed using SPSS version 26 to implement the data. The results show that the means of the radiation levels measured at all the zones do not statistically differ from the highest values determined globally 0.50-1.70 μSv/y; they lie within the radiation-free zones. Civilians may not always have a choice where the mobile tower will place. As a result, it may rely on some quick fixes, such as certified radiation protection items that offer all-around protection from mobile tower irradiance. The radiation shielding technology used in these goods alters the nature of irradiation from a constant to a variable waveform, rendering it useless.
Increased the need to promote the profession of auditing, and improving the performance of the audit process, which comes through the effective implementation of its tasks, where the auditor collects the necessary data about the nature of client activity, and any other information it deems necessary to carry out the planning and development of the strategy for how to determine the procedures for implementing the audit process and the scope and timing for evidence clues in order to form an opinion technician neutral about the fairness of the financial statements, as required by the standards of the field work of the planning and supervision of the internal control and evidence to prove, but the failure of the auditor whether in th
... Show MoreThis study aim to identify the concept of web based information systems since its one of the important topics that is usually omitted by our organizations, in addition to, designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.
This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat
... Show MoreAbstract
Epidemics that afflict humankind are descending renewed, plaguing them in the place and time they spread.
- The epidemic affects individuals and the movement of societies, and its treatment requires dealing with it according to Sharia, taking into account the current data and developments.
- Integrative jurisprudence: it is intended to know the practical legal rulings deduced from the combination of evidence of two or more sciences related to one topic related to it, and among these calamities is the Corona Covid-19 pandemic.
- It is permissible to use sterile materials that contain a percentage of alcohol in sterilizing hands and fogging places, including mosques.
T
... Show MoreThe aim of the research to highlight the calendar of the most important tools used by the Central Bank of Iraq, in the implementation of the function of supervisory oversight, to verify the stability of the banking system, and protect the funds of shareholders, and depositors in general and the absence of any raises the risks of default and financial failure in particular, for commercial banks. The most important flaws and weaknesses in these tools, in the early detection of the risks of continuity in a timely manner, The study concluded a set of conclusions, including the weakness of the tools used in the performance of the function of supervisory oversight in detecting cases of default and financial failure in the early time as well as
... Show MoreThis is a contextual study in face and isotope science, and I have made it in one of the terms faces and isotopes, which is the word (bad). Quranic also, and that is at every aspect they mentioned.
The nature of the research required that it be divided into three sections:
The first topic: I singled it out to show the types of contextual connotations.
- The second topic: I singled it out to define the word bad and its meaning.
- The third topic: I devoted it to the study of the word bad and explaining the significance of the Quranic context on the additional meaning and the original meaning.
Conclusion: It mentioned the most important results, which are:
1- The significance of the Quranic context is one of the most impo
The effectiveness and quality of legislation depend on the extent to which it relates to political , economic ,social ,geographical , health and moral realities , so the unrealistic legislation and its failure to address all the problems facing society make these legislation out of reality , this requires this legislation be able to regulate all aspects related to public health in society in exceptional circumstances such as cases of wars ,diseases and pandemics as outbreaks of corona virus in the word ,this study focuses on the effects of legislative omission on the effectiveness of the administration when performing its tasked in health administrative control in exceptional circumstances in light of spread of corona virus pandemic in Iraq
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show More