In The Bluest Eye (1970) , Toni Morrison addresses a timeless problem of white racial dominance in the United States and points to the impact it has on the life of black females growing up in the 1930's. Morrison in this novel explores how Western standards of ideal beauty are created and propagated with and among the black community. The novel not only portrays the lives of those whose dark skinned and negroid features blight their lives; it also shows how the standards of white beauty are imposed on black youth to cause a damage of one's self-love and esteem which usually occurs when beauty goes unrecognized
This article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t
... Show MoreAbstract :
The research aims to study the basic concepts of banking productivity and discuss different approaches to study what ends to identify the most important possible standards applied to measured within the Iraqi banking environment as well as research into the causes of low and high Iraqi banking productivity and identify possible treatments to curb those reasons as to ensure the rise. And in line with the research problem, which states what is the level of productivity and what are the causes of decline and the rise in private banking research sample individually. And what the Iraqi private banks and what is the relationship between performance and the impact of productivity change in the perform
... Show MoreThis research deals with the role of quantitative (indirect) tools of monetary policy that used by the Central Bank of Iraq in order to control and manage the size of the money supply that intermediate goal through which monetary policy is able to achieve its final goals, foremost among which is to reduce inflation and raise the value of the local currency in front of foreign currency rates. The research is based on a major hypothesis stating that quantitative tools have a direct and strong influence on the money supply, especially under the circumstances of the shift towards a market economy. There has been a branching relationship with this statistically significant relationship between the money supply and the quantitative tools used
... Show MoreEvaluation of the Antibacterial Efficacy of Electrolyzed Oxidizing Water as an Irrigant against Enterococcus faecalis (An In vitro Study), Noor A Khait*, Muna Saleem Kalaf
The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreIn networking communication systems like vehicular ad hoc networks, the high vehicular mobility leads to rapid shifts in vehicle densities, incoherence in inter-vehicle communications, and challenges for routing algorithms. It is necessary that the routing algorithm avoids transmitting the pockets via segments where the network density is low and the scale of network disconnections is high as this could lead to packet loss, interruptions and increased communication overhead in route recovery. Hence, attention needs to be paid to both segment status and traffic. The aim of this paper is to present an intersection-based segment aware algorithm for geographic routing in vehicular ad hoc networks. This algorithm makes available the best route f
... Show MoreThis research aims to analyse the problem of organizations in general and universities in particular, in dealing with �quality subjects� in a world where these organizations face the risks of becoming side lined and possibly vanished without looking for solutions that allow them to move in an open arena where change becomes the key to those solutions. Change here must be strategic and planning must adopts a way for organizations to develop mechanisms to manage change itself. Management leaders play a central role in achieving the principle required to chart new trends for universities in dealing with quality as a strategy that allows excellence and competition in light of the success of the processes of change. Change through reengineer
... Show MoreThe research is trying to identify the investment portfolio risks of the insurance company and their impact, on the Profitability ratios of the company, and whether the company's scientific methods followed in the measurement of these risks, and conducted research in the National Insurance Company. by relying on its annual budget as well as the annual reports, The search dealing with these data in theoretical and practical major premise to statistically significant between to investment portfolio risk and financial performance correlation and reach a set of conclusions and recommendations which are the following.
investments include many ri
... Show MoreAsthma is one of the most common chronic, non-communicable diseases affecting children worldwide. The estimated prevalence of pediatric asthma in Iraq is 15.8%. Physiologic, inflammatory and structural factors contribute to the development of asthma. Assessment and monitoring of asthma control can be done by a validated children asthma control test (CACT). Management of asthma must address three components which are an appropriate management plan, the most appropriate medication if necessary, and the use of safe and effective medication. The management plan should consider patient counseling and education about the definition of asthma, signs, and symptoms, the pathophysiology of asthma, common triggers for asthma and how can avoid them,
... Show More