Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations, after the terrorist was part of the weapon. Used in the terrorist operation, other types of weapons, tools and means have entered the terrorist scene. The weapons used have allowed the implementation of operations across distances, through remote control devices, drones and other technologies that enable terrorist elements to amplify the effect of operations according to In order to reduce costs, including the costs of terrorist elements carrying out operations, and causing the greatest amount of losses and terror in the targeted community or the country.
In a world of limited space, the owners are always surrounded by others next to them, and, consequently, there is hardly any activity which the owner may exercise on his land which would not affect the other owners. If he builds a building, that building may block the sun's rays or the air from the buildings next to it and owned by other people. And if he runs a business, the lands adjacent to that business may be overburdened with the accompanying noise or traffic. If oil is prospected in a land, the neighboring lands may be deprived of oil or their owners may be exposed to toxic fumes. Hence the importance of researching the intention of harming others, as it is one of the most important forms of abuse in the use of the right (especially
... Show MoreAbstract
In this research we been estimated the survival function for data suffer from the disturbances and confusion of Iraq Household Socio-Economic Survey: IHSES II 2012 , to data from a five-year age groups follow the distribution of the Generalized Gamma: GG. It had been used two methods for the purposes of estimating and fitting which is the way the Principle of Maximizing Entropy: POME, and method of booting to nonparametric smoothing function for Kernel, to overcome the mathematical problems plaguing integrals contained in this distribution in particular of the integration of the incomplete gamma function, along with the use of traditional way in which is the Maximum Likelihood: ML. Where the comparison on t
... Show MoreThis study aims to impact statement played by banking governance according to the decisions of the Basel Committee in achieving the strategic objectives of the banks, But order to achieve the this goal has been the adoption of two hypotheses in addition to the two main hypotheses as sub answered preliminary The study seeks to verify their health and two (no correlation relationship and impact between Banking governance and achieve strategic objectives), has been tested hypotheses. Study has reached
... Show MoreIn this study Isolated Pathogenic bacteria which causes Tonsillitis in Children with ages between 3-17 years. They are admitted to Central Children Hospital (Al-Karch) and Ebn-Albalady Hospital (Al-Rusafa). 200 cases were collected which include 120 Male and 80 Female. The result of the recent study shows that the isolation percentage was 40% from Male and 35% from Female. In this study Fifty six isolated were Identified, 20 were ?-hemolytic Streptococcus which was Streptococcus pyogenes, formed (36%) from all isolated.6 Pathogenic bacteria were ?- hemolytic Streptococcus which was Streptococcus pneumoniae formed (11%). The number of Moraxella catarrhalis bacteria was 12 formed (21%), the number of Haemophilus influenzae was 1
... Show MoreThe data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.
Recently, that there has been a decline in the levels of female players for this event in recent years compared to developments in the world, as this activity depends to achieve the highest level of performance on the physical capabilities and physiological indicators of the player who It is reflected in the achievement, which results in the loss of time for Iraqi female runners compared to the world champions in the (100) meter hurdles competition, which reflects on the level of achievement. The two researchers used the experimental approach in addressing the research problem, and the experimental design used the method of the two equal groups, the two experiments with the pre and post-tests. Female runner and second experimental group (4)
... Show MoreThis research seeks to shed light on what you add intangible assets of benefit to the company and this antagonize pause for consideration because it makes the company in a good competitive position stimulates the rest of the companies to acquire those assets.
That many companies have achieved competitive advantages in the market do not even achieved monopolies increased the value and reaped extraordinary profits as a result of those assets which requires the need to be measured to determine the extent to which contribution in the emergence of the value added to the value of the company on the one hand and to make the presentatio
... Show More