Preferred Language
Articles
/
mhfDsI0BVTCNdQwC1Rhm
The Limitations on the Judge’s Authority in Judicial Interpretation – France as a Model
...Show More Authors

When exercising their authority in the jurisprudence, judges are subject to a set of restrictions that they must adhere to, as they do not want their jurisprudence to be accepted and welcomed by law practitioners in general, and legal scholars in particular, and in contrast to it, the arrows of criticism and defamation will extend to that jurisprudence, and then they will have to reverse them . Perhaps the most important of those restrictions imposed on judges is their observance of justice between the parties to the lawsuit through their lack of bias for one of the parties at the expense of the other, in addition to their observance of public order and public morals, as well as their observance of the legal texts that they work under its umbrella, and last but not least their respect for the rights and fundamental freedoms of individuals As stipulated in international conventions as well as national laws.

View Publication
Publication Date
Wed Dec 20 2023
Journal Name
Arab Science Heritage Journal
بعض وظائف النبي صلى هللا تعالى عليه وآله وصحبه وسلم الواردة في القرآن الكريم
...Show More Authors

The research included an introduction, and three functions
of the Prophet (peace and blessings of Allaah be upon him), a
machine and a companion, and a conclusion , the first function,
which is zakaah, and began with it because it is the basis of every
work, no work is accepted by Allaah except what was sincere to
him, as well as sincere intention, because accepting works is
entrusted with the

View Publication Preview PDF
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Knowledge Economy in Financial Reporting System Development proposed model ""
...Show More Authors

This  world is moving towards knowledge economy which basically depends on knowledge and information. So, the economic units need to develop its financial reporting system which helps to provide useful information in timeliness for investors in accordance with the requirements of  the knowledge economy and meets the needs of those investors. This  research aims to revealing the reflects of knowledge economy on the approaches of financial reporting and suggesting a financial reporting model in the environment of knowledge economy,  depending on combining the value approach with the events approach using database and communication technology and providing useful accounting information for all users regardless of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of The College Of Education For Women
The Video effect on Youths Value
...Show More Authors

The Video effect on Youths Value

View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
NEW PERSPECTIVES ON SHAKESPEAR'S "THE TEMPEST"
...Show More Authors

         This paper is mainly concerned with the study of the moral aspects that prompts William Shakespeare to attempt a romance in which he has embedded the epitome of his thought, experience, and philosophy concerning certain significant aspects of human life whose absence or negligence may threaten human existence, peace, and stability. From the beginning of history man realizes the importance of prosperity on the many and various levels that touch and address his needs and desires—natural, material,  and spiritual. The Tempest, due to the dramatist's awareness of the aforementioned values, reflects the dramatist's duty as to projecting and unfolding these important aspects, rec

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
NEW PERSPECTIVES ON SHAKESPEAR'S "THE TEMPEST"
...Show More Authors

This paper is mainly concerned with the study of the moral aspects that prompts William Shakespeare to attempt a romance in which he has embedded the epitome of his thought, experience, and philosophy concerning certain significant aspects of human life whose absence or negligence may threaten human existence, peace, and stability. From the beginning of history man realizes the importance of prosperity on the many and various levels that touch and address his needs and desires—natural, material, and spiritual. The Tempest, due to the dramatist's awareness of the aforementioned values, reflects the dramatist's duty as to projecting and unfolding these important aspects, reconciliation and forgiveness, that promote prosperity which is th

... Show More
View Publication Preview PDF
Publication Date
Thu May 15 2025
Journal Name
Journal Of Legal And Political Studies
International and Regional Competition in the Middle East and its Impact on Iraqi National Security, with Special Reference to the Kurdistan Region: A Study of Challenges and Opportunities
...Show More Authors

This competition between competing forces, organized into axes with conflicting objectives, is reflected in all regional affairs and the goals and interests of countries within them, including Iraq. Among the most important aspects impacted by the repercussions of international and regional competition in the region is Iraqi national security, based on its vital importance in preserving the sovereignty and entity of the Iraqi state, protecting the interests and cohesion of the state and people, ensuring and defending their present and future, and interacting with various regional and international activities. The Kurdistan Region, as an important part of Iraq with its own unique characteristics, may be one of the most important regi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Civil Engineering Journal
Calibration of a New Concrete Damage Plasticity Theoretical Model Based on Experimental Parameters
...Show More Authors

The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop

... Show More
Scopus (35)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref