Food comes after air and water in terms of importance in the survival of human beings, In addition, it is the support and strength of health and support, if lost or destroyed man would die or get sick and become a heavy burden on himself and his society. Food, like other sources of life, is subject to various risks and corruption comes from countless sources. Among these dangers is the result of spontaneousness, lack of knowledge or compulsion due to the interaction of variables beyond the will of the producer and the consumer, such as pollution of water, air and environment and their reflection on food consumed by people. However, we can’t deny that some reasons of corruption are intentional and resulting from a planning in advance in order to make an illegal profit at the expense of people's health and safety. The importance of provision of food these days has increased as the number of sources of fraud and manipulation of its components has increased, not to mention the variety of cheating and scamming methods that accompany it from the factory until it reaches the consumer. Increasing the population and increasing the need to feed millions of people in different countries of the land led to an increase in quantities of materials transferred, pre-processed and packed, which are prepared through complex manufacturing processes and go through multiple hands starting from the farm to shipping then factory and storage and finally supply in the wholesale and retail markets. There is no question that all those who follow the food chain have interests and goals that come primarily from profit. It is not surprising that many of them seek to maximise their personal benefit and avoid potential losses, even at the expense of consumers. Here comes the role of the important mediator in the transfer of knowledge and warning, which warns of dangers resulting from consumption of adulterated food and there is no doubt that various media are the main role of this mediator in contemporary society. A thorough understanding of consumer behavior will provide marketing managers with a better idea of how marketing activity works and help them develop a more efficient and capable marketing strategies. Predictability of consumers' behavior and purchasing motivations that reflect their desires and needs will help develop appropriate marketing policies. Future consumer behavior can provide information and insight into consumer decisions, allowing to identify the relationship between attitudes of consumers and journalists towards the phenomenon of cheating in food. We hope this research would provide an objective picture of these trends and study the relationship between perception and knowledge of journalists about the phenomenon under study and the impact on attitudes of consumers, also to indicate the success of press in raising awareness and guidance of the audience by analyzing the press coverage of this phenomenon during the research period. This research aims to reach an answer to a number of questions related to the trends of consumers and journalists about the phenomenon of the lack of food. These questions relate in fact to the basic components of trends, specifically the behavioral and cognitive aspects and related views. The Iraqi press in the field of combating the phenomenon of cheating in food stuffs, whether through identification of the mechanism of work or through the technology of this phenomenon in 2001.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThis research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show MoreThe present work investigates the effect of; superficial air velocities of: 1, 3, and 6 cm/s for two types of perforated distributor on hydrodynamic characteristic in a gas-liquid dispersion column of; air-water, and airaqueous-n-propanol solution. Bubble distribution, gas holdup, and power consumption are parameters take in consideration. Experimental work was carried out in perspex column of 8.5 cm inside diameter and 1.5 m height. Two types of bubble generator (perforated plate) were fixed at the bottom of the column; plate A (99 holes of 0.5 mm diameter and free area of 0.34%), plate B (20 holes of 1.5 mm diameter and free area of 0.62%). Photographic technique was used to measure the bubble parameters. The experimental results were
... Show MoreAn aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical
... Show MoreForm the series of generalization of the topic of supra topology is the generalization of separation axioms . In this paper we have been introduced (S * - SS *) regular spaces . Most of the properties of both spaces have been investigated and reinforced with examples . In the last part we presented the notations of supra *- -space ( =0,1) and we studied their relationship with (S * - SS *) regular spaces.
The soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.
Abstract
Black paint laser peening (bPLP) technique is currently applied for many engineering materials , especially for aluminum alloys due to high improvement in fatigue life and strength . Constant and variable bending fatigue tests have been performed at RT and stress ratio R= -1 . The results of the present work observed that the significance of the surface work hardening which generated high negative residual stresses in bPLP specimens .The fatigue life improvement factor (FLIF) for bPLP constant fatigue behavior was from 2.543 to 3.3 compared to untreated fatigue and the increase in fatigue strength at 107 cycle was 21% . The bPLP cumulative fatigue life behav
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreThe growth curves of the children are the most commonly used tools to assess the general welfare of society. Particularity child being one of the pillars to develop society; through these tools, we can path a child's growth physiology. The Centile line is of the important tools to build these curves, which give an accurate interpretation of the information society, also respond with illustration variable age. To build standard growth curves for BMI, we use BMI as an index. LMSP method used for finding the Centile line which depends on four curves represents Median, Coefficient of Variation, Skews, and Kurtosis. These can be obtained by modeling four parameters as nonparametric Smoothing functions for the illustration variable. Ma
... Show More