Terrorist crime is considered a serious act that outweighs all other crimes in terms of impact and result, because it has a wide range on societies, and it also contains a great thing of danger represented in its purpose, and here describing terrorism as a crime is a description that does not give the full right to this behavior or that it It abbreviates it and does not show its actual reality, given that terrorism contains several different crimes and the roles of its contributors, and these roles are necessary to reach the result or the end. In which each episode is complementary to the other, it is not a single act, but rather several joint and complex actions that in turn all lead to the result, and the agreement in the terrorist project begins when agreeing on the formation of the project, and thus the intention and intent is available in its formation and the path to its goal, and therefore, the agreement cannot be considered On the project, it is a consequential contribution as in other crimes, except for the agreement on state security crimes, which the legislator considered an independent crime by mere agreement, even if the crime did not occur and ignored for the people The terrorist threat, therefore, the agreement is an independent act and an existing crime and an original actor who did not commit it even if the crime did not occur, because the danger of the terrorist crime is not less than the seriousness of the state security crimes, but rather it is more dangerous because it is related to society and its change and its connection to belief and thought, so the agreement is in the terrorist project It is a crime for which the law is held accountable, even if it did not occur
This book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.
In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise near topological spaces over B. Also, we introduce the concepts of fibrewise near closed and near open topological spaces over B; Furthermore we state and prove several Propositions concerning with these concepts.
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreObjective: This study aims to examine how implementing Extensible Business Reporting Language (XBRL) enhances the efficiency and quality of environmental audits and sustainability reporting in eco-friendly universities. Aligned with Sustainable Development Goal 12 (Responsible Consumption and Production), the study emphasizes promoting transparency and precision in sustainability reporting to encourage responsible management of resources within academic institutions. Theoretical Framework: The importance of our study is evident in the importance of accurate and transparent reports in the development of environmental performance with theories of sustainable reporting and environmental auditing. One of the most important digital
... Show MoreAn image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-
... Show MoreThis paper deals with a new Henstock-Kurzweil integral in Banach Space with Bilinear triple n-tuple and integrator function Ψ which depends on multiple points in partition. Finally, exhibit standard results of Generalized Henstock - Kurzweil integral in the theory of integration.
In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.
Objective: The aims of research to identify sample of websites of Arabian medical periodicals and exam applying to
standards for publishing on the internet.
Methodology: A survey method is applied about nine medical periodicals websites and data are collected through
forms include five international standards to assessing websites.
Results: of data collected, the following findings are obtained:
1. Through examining website addresses, unsuitability was found in using Universal Resources Locater, because six of
periodicals use com. in URL. While, all of them not relevance commercial but scientific aim.
2. To measure Credibility Standard by adopting numbers values, the results found, four of periodicals obtained (level
The reaction of 2-amino-benzothiazole with bis [O,O-2,3,O,O – 5,6 – (chloro(carboxylic) methiylidene) ] – L – ascorbic acid (L-AsCl2) gave new product 3-(Benzo[d]Thaizole-2-Yl) – 9-Oxo-6,7,7a,9-Tertrahydro-2H-2,10:4,7-Diepoxyfuro [3,2-f][1,5,3] Dioxazonine – 2,4 (3H) – Dicarboxylic Acid, Hydro-chloride (L-as-am)), which has been insulated and identified by (C, H, N) elemental microanalysis (Ft-IR),(U.v–vis), mass spectroscopy and H-NMR techniques. The (L-as am) ligand complexes were obtained by the reaction of (L-as-am) with [M(II) = Co,Ni,Cu, and Zn] metal ions. The synthesized complexes are characterized by Uv–Visible (Ft –IR), mass spectroscopy molar ratio, molar conductivity, and Magnetic susceptibility techniques. (
... Show More