Through the early childhood and after the ablactating the child learns acquired food habbits that might studying with him throughout his life. Here the parents role arises: teaching the child the sound food habits and hygienic styles and whatever beneficial to the health and with the sufficient quantities for the body. In this way the experiences the child learns at home will be of great help in his future life in choosing the suitable food after becoming more dependent in making his decisions and choices away from his parents. The results in this study showed that the averages of the children’s consumption of the high energy foods in comparison with the other highest consumption average , after that comes the con sumption of soft drills , then the lollipops , gums and cacao , finally , the confectioneries recorded the lowest percentage in purchase , the child’s wish recorded the highest average.
In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.
Geography of industry has been considered a branch of important economic geographical branches. This importance has been regarded as a reflection on the industrial sector contribution in economies of any state since they contribute into the total national product ; it also assimilates a huge number of labor hands . The industry of grains grinding has been considered as one of the main food industries having a main role in satisfying the need of the population from the foods. The industry is continued to use the food as daily meal . Here, it should predict the population in Baghdad and for every district until the end of 2025 and knowing either these grains grinders are able to meet and satisfy the needs of populations of flours, making s
... Show More
This research addresses: Sharh Usul Al-Bazdawi "Explanation of the Fundamentals for Al-Bazdawi", by studying and investigating, from the beginning of prohibition chapter to its end. The researcher conducted a study about this book stating its significance and introducing the compiler and the commentator. The researcher as well mentioned that the prohibition has a special formula and requires repetition, and he went on explaining that prohibition according to Hanafis does not require absolute corruption of the prohibited matter unless based on an evidence, and that what is condemned as wrong act for itself is considered void and what is condemned as wrong act for external reasons is considered corrupt accor
... Show MoreThe research aims at the possibility of measuring the technical and scale efficiency (SE) of the departments of the College of Administration and Economics at the University of Baghdad for a period lasting 8 years, from the academic year 2013-2014 to 2018-2019 using the method of Applied Data Analysis with an input and output orientation to maintain the distinguished competitive position and try to identify weaknesses in performance and address them. Nevertheless, the research problem lies in diagnosing the most acceptable specializations in the labor market and determining the reasons for students’ reluctance to enter some departments. Furthermore, the (Win4DEAp) program was used to measure technical and scale efficiency (SE) and rely on
... Show MoreThis research aims to study the important of the effect of analysis of covariance manner for one of important of design for multifactor experiments, which called split-blocks experiments design (SBED) to deal the problem of extended measurements for a covariate variable or independent variable (X) with data of response variable or dependent variable Y in agricultural experiments that contribute to mislead the result when analyze data of Y only. Although analysis of covariance with discussed in experiments with common deign, but it is not found information that it is discussed with split-Blocks experiments design (SBED) to get rid of the impact a covariance variable. As part application actual field experiment conducted, begun at
... Show MoreA Raman spectroscopy method was optimised to examine the chemical changes of aspirin tablets after interaction with helium temperatures. Several aspirin tablets were exposed to plasma-assisted desorption ionisation flame for different times (10, 30, 50, 60, 180 and 300s) and then analysed by Raman spectroscopy using optimal conditions. The changes in chemistry between exposed and fresh (without exposure to plasma) tablets were compared. The vibrational peaks of the aspirin molecule in the Raman spectrum were identified by checking the peak position. The results showed clear spectra with increases in intensity of vibrational peaks until 30s, whereas no spectra were measured for the exposed tablets to plasma flame after 50s. It can, the
... Show MoreThis research includes problems that facing the philosophy of education in the variables of knowledge and Informatics society (techno _ social).
The problematic research included three questions:
1- What are the concepts and characterization related to the problematic of relationship between the philosophy of education and informatics variables (techno - social).
2-What kind of problems facing speech philosophy of education in the variables information (techno - social)
3 - What are the perceptions of educational proposed to address problematic philosophy of education in the scope of human (human nature) and (values and morals), in addition the research may explain the co
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More