Praise be to God alone, and prayers and peace be upon the one after whom there is no prophet, and after:
This is a regular judicial search for the issuance, validity, and cancellation of regulations in the Saudi system. It came in an introduction and four demands and a conclusion of the most important results, then a list of the most important sources and references, in which I presented: A brief study on the issuance of regulations in the Kingdom of Saudi Arabia and the stages that they pass through, their validity and application, and the rules that govern this system in terms of people, places and times, then canceling and amending regulations And its rulings, I referred to it to the original sources approved in this section,
... Show MoreThe objective of the investigation was to analyze the structure and administration of the political system in Iraq (post-ISIS). After 2003, the Iraqi political system suffered the fundamental problem of its failure to achieve the political and social inclusion that characterizes democratic systems, to guarantee the establishment of a "state for all", while respecting differences. Political representation has moved from the system of sectarian ethnic components, under the title of consensual democracy, to the representation of leaders and the realization of their interests and the interests of their parties at the expense of the groups that claim to represent them, which complicates the problem. In this sense, the new political syste
... Show MoreThe genus of Chrysobothris Eschscholtz, 1829 is one of the most diverse and widespread genera of the family Buprestidae of some 700 described species distributed throughout the world. In Iraq, particularly in the Kurdistan region, about 4 species had been recorded so far, many of these species are sympatric, share larval host plants, and are difficult to reliably separate morphologically. The current study investigates species limits and relationships among the recognized species occurring within the Erbil Province; mitochondrial cytochrome C oxidase (COX I) molecular analysis confirmed the monophyly of two Chrysobothris species, Ch. affinis (Fabricius, 1794) and Ch. chrysostigma (Linnaeus, 1758). Implications of the resultant larval mor
... Show MoreThe most common form of childhood cancer is leukemia, Calculation for more than one third of all childhood cancers among those ages 1 day – 14 years. The diseases of leukemia are worldwide, it occurred in both genders from male and females and in all age. A total of 80 different samples of patient children were collected from the central teaching hospital of pediatric in Baghdad. Obtained during the period from 1st Sept. 2019 till the 31 th of Aug. 2020. Each isolates identification by using Vitek 2. Isolated organism in leukemic children show 18 (22.5 %) gram positive and 62 (77.5 %) gram negative from the total sample 80 (100.0 %). The percent of male is 45 more than female which represents 35 in most age groups between age (1 d
... Show MoreThe theatre costume with the rest of the theatre show elements constitute a system of the meaning relations that produce a visual image that helps the recipient to decipher the theatre scene, let alone the manifestation of time in its levels (past, present, future) through the design construction of the theatre elements among which is the theatre costume. In order to know the way of manifesting time through the formulation of the theatre costumes, the research question has been put as follows: how to manifest time through the design construction for the theatre costumes unit, from which the research objective is derived as follows: Revealing the possibility of the designing unit of the costumes in manifesting the levels of time wit
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe operation and management of water resources projects have direct and significant effects on the optimum use of water. Artificial intelligence techniques are a new tool used to help in making optimized decisions, based on knowledge bases in the planning, implementation, operation and management of projects as well as controlling flowing water quantities to prevent flooding and storage of excess water and use it during drought.
In this research, an Expert System was designed for operating and managing the system of AthTharthar Lake (ESSTAR). It was applied for all expected conditions of flow, including the cases of drought, normal flow, and during floods. Moreover, the cases of hypothetical op
... Show MoreThe present study was performed to detect the molecular and the phylogenetic identification of species that belonging to the genus of Moniezia Blanchard, 1891 which affected intestines of sheep in Al-Diwaniyah city, Iraq; fifty intestine samples were sought for the infestation of Moniezia spp. from the city slaughterhouse from 1 October to 30 November 2017, this tapeworm was found to infest the intestines of 13 sheep.
For morphological identify the genus of this tapeworm, eggs from one gravid proglottid of the thirteen worms were examined, polymerase chain reaction (PCR) and the PCR-product-based sequencing were applied on 4 Moniezia tapeworms targeti
... Show More