Food comes after air and water in terms of importance in the survival of human beings, In addition, it is the support and strength of health and support, if lost or destroyed man would die or get sick and become a heavy burden on himself and his society. Food, like other sources of life, is subject to various risks and corruption comes from countless sources. Among these dangers is the result of spontaneousness, lack of knowledge or compulsion due to the interaction of variables beyond the will of the producer and the consumer, such as pollution of water, air and environment and their reflection on food consumed by people. However, we can’t deny that some reasons of corruption are intentional and resulting from a planning in advance in order to make an illegal profit at the expense of people's health and safety. The importance of provision of food these days has increased as the number of sources of fraud and manipulation of its components has increased, not to mention the variety of cheating and scamming methods that accompany it from the factory until it reaches the consumer. Increasing the population and increasing the need to feed millions of people in different countries of the land led to an increase in quantities of materials transferred, pre-processed and packed, which are prepared through complex manufacturing processes and go through multiple hands starting from the farm to shipping then factory and storage and finally supply in the wholesale and retail markets. There is no question that all those who follow the food chain have interests and goals that come primarily from profit. It is not surprising that many of them seek to maximise their personal benefit and avoid potential losses, even at the expense of consumers. Here comes the role of the important mediator in the transfer of knowledge and warning, which warns of dangers resulting from consumption of adulterated food and there is no doubt that various media are the main role of this mediator in contemporary society. A thorough understanding of consumer behavior will provide marketing managers with a better idea of how marketing activity works and help them develop a more efficient and capable marketing strategies. Predictability of consumers' behavior and purchasing motivations that reflect their desires and needs will help develop appropriate marketing policies. Future consumer behavior can provide information and insight into consumer decisions, allowing to identify the relationship between attitudes of consumers and journalists towards the phenomenon of cheating in food. We hope this research would provide an objective picture of these trends and study the relationship between perception and knowledge of journalists about the phenomenon under study and the impact on attitudes of consumers, also to indicate the success of press in raising awareness and guidance of the audience by analyzing the press coverage of this phenomenon during the research period. This research aims to reach an answer to a number of questions related to the trends of consumers and journalists about the phenomenon of the lack of food. These questions relate in fact to the basic components of trends, specifically the behavioral and cognitive aspects and related views. The Iraqi press in the field of combating the phenomenon of cheating in food stuffs, whether through identification of the mechanism of work or through the technology of this phenomenon in 2001.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThis research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show MoreConsidering the magnitude of its economic, social and political impact, unemployment represents a crucial challenge confronting the majority of the countries of the world. The problem of the study was the high rates of unemployment in Sudan and the inability of economic growth rates to keep pace with the steady increases in unemployment rates during the study period. This study aimed to identify the economic and social variables influencing unemployment rate in Sudan, in addition to measuring the impact of these variables over the period (1981-2015). Data were collected from databases of the World Bank and Atlas of the World's data .The study hypothesized the presence of statistically significant and direct relationship between u
... Show MoreForm the series of generalization of the topic of supra topology is the generalization of separation axioms . In this paper we have been introduced (S * - SS *) regular spaces . Most of the properties of both spaces have been investigated and reinforced with examples . In the last part we presented the notations of supra *- -space ( =0,1) and we studied their relationship with (S * - SS *) regular spaces.
Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreIn this article, we introduce and study two new families of analytic functions by using strong differential subordinations and superordinations associated with Wanas differential operator/. We also give and establish some important properties of these families.
Let R be a ring with identity and M be a right unitary R-module. In this paper we
introduce the notion of strongly coretractable modules. Some basic properties of this
class of modules are investigated and some relationships between these modules and
other related concepts are introduced.
The soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.