Besides the role of state institutions that come in the forefront of their priorities and obligations to provide security and development of the economy and reduce the unemployment rate and the reduction of inflation and improving education, health and others, the Community Partnership At frames what has become known as the institutions of society civil-with the state does not eliminate the role, but rather complements its role ; it is the role of civil society partner and an extension of the role of the state in the face of challenges and crises, but it may be sometimes a race role in addressing social, political and economic issues of the role played by the state, not complementary.
The highlighting the specificity of the relationship between the youth site within the institutions of civil society and development highlights the importance of the role of these institutions in the rehabilitation of young leaders in various fields, and to raise the sense of national belonging, and the establishment of democracy and respect for human rights values, and then enable the integration into the overall development paths.
There is no doubt that leadership is a social phenomenon , and human activity does not take place , but remained in the family cohesive have a common goal Alaho instil confidence in the same of her sons to be better , and the importance of this subject Arta researchers to identify the extent to which children in this phenomenon and to identify the causes and extent of its spread in the community , has been directing an open question (Appendix 1) to a group of kindergarten teachers , to learn about the characteristics of leadership that can be enjoyed by kindergarten children . The current research aims to:
1. Detect levels of leadership qualities among kindergarten children in the light of the characteristics of leadership skills
2
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn the past two decades, maritime transport traffic has increased, especially in the case of container flow. The BAP (Berth Allocation Problem) (BAP) is a main problem to optimize the port terminals. The current manuscript explains the DBAP problems in a typical arrangement that varies from the conventional separate design station, where each berth can simultaneously accommodate several ships when their entire length is less or equal to length. Be a pier, serve. This problem was then solved by crossing the Red Colobuses Monkey Optimization (RCM) with the Genetic Algorithm (GA). In conclusion, the comparison and the computational experiments are approached to demonstrate the effectiveness of the proposed method contrasted with other
... Show MoreThe present study investigates deep eutectic solvents (DESs) as potential media for enzymatic hydrolysis. A series of ternary ammonium and phosphonium-based DESs were prepared at different molar ratios by mixing with aqueous glycerol (85%). The physicochemical properties including surface tension, conductivity, density, and viscosity were measured at a temperature range of 298.15 K – 363.15 K. The eutectic points were highly influenced by the variation of temperature. The eutectic point of the choline chloride: glycerol: water (ratio of 1: 2.55: 2.28) and methyltriphenylphosphonium bromide:glycerol:water (ratio of 1: 4.25: 3.75) is 213.4 K and 255.8 K, respectively. The stability of the lipase enzyme isolated from porcine pancreas (PPL) a
... Show MoreCalcifying epithelial odontogenic tumour (CEOT) is a benign odontogenic neoplasm of epithelial origin that secretes an amyloid‐like protein tending towards calcification. This study aims to describe a case series from Iraq of one of the rarest odontogenic tumours.
Clinical and histopathological analysis of Calcifying epithelial odontogenic tumour cases that are archived at the oral pathology laboratory of the college of dentistry (Baghdad University) from 2000 to 2019.
Six cases of CEOT were regi
In this paper, a new method of selection variables is presented to select some essential variables from large datasets. The new model is a modified version of the Elastic Net model. The modified Elastic Net variable selection model has been summarized in an algorithm. It is applied for Leukemia dataset that has 3051 variables (genes) and 72 samples. In reality, working with this kind of dataset is not accessible due to its large size. The modified model is compared to some standard variable selection methods. Perfect classification is achieved by applying the modified Elastic Net model because it has the best performance. All the calculations that have been done for this paper are in
The alterations in glyoxylate reductase and hydroxy-pyruvate reductase concentrations in the sera and the genetic alterations associated with calcium oxalate kidney stones in Iraqi patients were not studied previously so this study aimed to focus on these points. This study included 80 subjects; they were 50 patients with calcium oxalate stones compared to 30 apparently healthy controls. Biochemical investigations for kidney functions (creatinine, urea, and uric acid), were performed on the sera of both groups. Also, complete blood count, random blood sugar, and blood group tests. Furthermore, urine had been collected for General Urine Examination to visualize oxalate crystals in the urine of the patient. Also, the GRHPR
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreThe concept of Cech fuzzy soft bi-closure space ( ˇ Cfs bi-csp) ( ˇ U, L1, L2, S) is initiated and studied by the authors in [6]. The notion of pairwise fuzzy soft separated sets in Cfs bi-csp is defined in this study, and various features of ˇ this notion are proved. Then, we introduce and investigate the concept of connectedness in both Cfs bi-csps and its ˇ associated fuzzy soft bitopological spaces utilizing the concept of pairwise fuzzy soft separated sets. Furthermore, the concept of pairwise feebly connected is introduced, and the relationship between pairwise connected and pairwise feebly connected is discussed. Finally, we provide various instances to further explain our findings.