The political system in Indonesia, since gaining independence from the Dutch colonialism on the seventeenth of August 1945, has gone through long stages. The Indonesian constitution stipulated that the country is based on a democracy. In 1956 the first free elections were held in Indonesia, and President Sukarno announced the adoption of the directed democratic system Then, during the era of President Suharto, the state entered a phase called democracy based on the Five Pancasila principles, which is a false democracy because it served the interests of Suharto, who in his long reign had political and economic corruption leading up to 1998, when the Indonesian people revolted, and the government of Soeharto was overthrown
... Show MoreThere are Islamic sources and books that deal with the different doctrinal and differential framework of the Islamic religion with a monistic approach, describing them with embarrassing jurisprudential titles such as: excommunication and expiation, and epithets that carry the characteristics of hatred and rejection, in addition to removing them from the sect and religion, and the reason for that is that the doctrine (A) or (b) considers itself the doctrine that represents only the Islamic religion, and other doctrines are misguided and disbelieving. the reasons behind this - besides the attempt to establish doctrinal and fiqih rooting in claiming truth and escaping from within the foundational differential doctrinal system – is the pol
... Show MoreThe research dealt with a study of economic diversification indicators in Iraq and an indication of the extent to which economic diversification events are desirable in its sectors because desirable diversification events are truly the best means of targeting a fair distribution of income. The research included studying the experiences of selected countries for Norway and Chile, and studying economic indicators and policies for each of them in order to benefit From these two experiences, the research has concluded that the Iraqi economy suffers from a large concentration of the oil sector, which made the Iraqi economy unilateral in which oil represents 90% according to the Herfindel-Hirschman Index, either for Norway and Chile, i
... Show MoreABSTRACT The isolation and characterization of (27) isolate of extreme halophilic bacteria was performed ninteen isolate belonged to the genus Halobacterium which included Hb.halobium. Hb. salinarium, Hb. volcanii. Growth curve and generation time in logarthmic phase was measured and found to be (12.8hr±0.32), (11.2hr±0.2), (9.8hr±0.87), respectivaly. Effect of various concentrations of NaCl, KCI, NH4Cl and MgSO4.7H2O was studied, NaCl was essential for the rod shape rapid growth Rat and pigmentation. Less than 1% concentration caused lysis of bacteria. Yeast extract was the best carbone source as compared with glucose and casamino acid.
The support qualitative information regards as an additional step in the process of decision-making where the method following by companies to provide information help in the creation of value because it is very important to deliver information to investors about their stratigies and what happen truly inside the companies i.e. every case relating with the expectations of stockhotslder and the prices of markets depending on those expectation ,and if the matter isn’t that there will be lack of confidence thate couldn’t be backed again. The decisions of the investors effected by security ,economic ,political, psychological, emotional ,and financial factors .
... Show MoreThis research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show MoreVisual analytics becomes an important approach for discovering patterns in big data. As visualization struggles from high dimensionality of data, issues like concept hierarchy on each dimension add more difficulty and make visualization a prohibitive task. Data cube offers multi-perspective aggregated views of large data sets and has important applications in business and many other areas. It has high dimensionality, concept hierarchy, vast number of cells, and comes with special exploration operations such as roll-up, drill-down, slicing and dicing. All these issues make data cubes very difficult to visually explore. Most existing approaches visualize a data cube in 2D space and require preprocessing steps. In this paper, we propose a visu
... Show MoreThe using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible parametric models and these models were nonparametric, many researchers, are interested in the study of the function of permanence and its estimation methods, one of these non-parametric methods.
For work of purpose statistical inference parameters around the statistical distribution for life times which censored data , on the experimental section of this thesis has been the comparison of non-parametric methods of permanence function, the existence
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show More