تأثير تكوين الشخصية على السلوك السياسي
Highlights the role of taxes in being a major source of funding sources internal economic and social development, and then, any decrease in tax revenue caused by tax evasion, for example, would weaken the government's ability to finance their investments and core financing private sector investment as a result of reduced ability to increase their reserves's cash banks, as well as the weakening of the effectiveness of tax evasion taxes as a tool to guide economic activity in the framework of service for development, and to achieve justice. And the statement of the reasons for and methods of evasion mandated to pay the tax due on them, whether legitimately or illegal with the statement of the proposed methods to tackle tax evasion and elimina
... Show MoreThe issue, the existence of God Almighty, and the creativity of the universes including the whale, and assets and how diversified, and faith in him and his lordship and divinity, is a delicate issue, and very important and dangerous, and it occupied human thought old and new, and still occupy it until God takes the land and on it. Many complex issues of thought, behavior, and ethics have resulted in the belief of many communities in the existence of the Almighty, having ruled their minds, depicting their beliefs and distancing their thoughts about slippage and abuse. When they looked at the wonders of creatures and the minutes of the assets, they thought about the planetary and astronomical motion systems. His existence was denied by ath
... Show MoreThe purpose of this research is to study the quality of scientific research at the University of Baghdad in light of scientific piracy and plagiarism of research and results and attribute it to others intentionally or unintentionally. Proactive writing such as stealing ideas or synthesizing the results of one another over others and its negative impact on the quality of scientific outputs and the reputation of educational organizations through an exploratory study in the faculties of the University of Baghdad, scientific and humanitarian. As for the aims of the study, it was determined by determining the negative impact of piracy on scientific research. A Likert five-point scale was used in this research. The research community c
... Show MoreRNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce
... Show More
مشكلة البحث
وتعد مرحلة المراهقة من اصعب المراحل التي يمر بها الفرد واخطرها اذ يطلق عليها بمرحلة التفكير المجرد ، وهي مرحلة حاسمة في حياته اذ تتكون لديه معالم الشخصية .أنهم خزين الامة الحقيقي من الطاقات الحيوية التي لا تنضب لذا يجب الاهتمام بهذه الشريحة من المجتمع وتطويرهم وتوجيههم لاسلم الطرق للحفاظ على مستقبلهم ومستقبل الا
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
In the Name of God, the Most Gracious, the Most Merciful
Praise be to God, who taught the pen anthropology unless he knows, and peace and blessings be upon the master of bullying, and the imam of the eloquent Prophet Muhammad, the sincere and faithful, and his family and companions as a whole and whoever followed him to the Day of Judgment. And after:
The science of grammar is among the most important of all language sciences at all, if not the most important of its sciences, due to the multiplicity of its doctrines and schools, the diversity of its methods, its phenomena and subjects, as well as the connection of this science with the most honorable languages,
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show More