عرض كتاب على خط النار مذكرات الرئيس الباكستاني
The aim of this study is to know the effect of different percentages of chitosan added to drinking water on the weight and quality of quail meat, physical anatomy in terms of (the body of the long carcass, the girth of the chest, the length of the thigh bones, the thigh racket, the fullness of the chest), chemical analysis (protein, moisture, fat and ash) and sensory evaluation of quail meat. It was purchased 320 Iraqi-origin birds of quail and one day old. Chicks were randomly distributed to three equal groups' treatments and treated with chitosan and added to the drinking water: the first treatment (0.1 gm./L water only as a control treatment), the second treatment (0.2 gm./L of chitosan was added to the drinking water) and the
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreWith the growing use of electronic commerce has worked many companies, especially public shareholding to take advantage of them treated in the trade, so that the e-commerce part of the corporate environment, and this has made a career of accounting and auditing facing new challenges to the sophistication of the information and the rapid growth in the market for electronic commerce. And raised many questions about the ability of the audit profession to facing these challenges and how to audit operations of e-commerce and how to give confidence on websites, this sense it has become necessary keep the internal control systems of this technology and what has caused changes to the accounting system, and evolve to fit the developments that hav
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreThe aim of this work is to study the factors that affect the welding joint of dissimilar metals. Austenitic stainless steel-type AISI (316L) with a thickness of (2mm) was welded to carbon steel (1mm) using an MIG spot welding. The filler metal is a welding wire of the type E80S-G (according to AWS) is used with (1.2mm) diameter and CO2 is used as shielding gas with flow rate (7L/min) for all times was used in this work.
The results indicate that the increase of the welding current tends to increase the size of spot weld, and also increases the sheer force. Whereas the sheer force increased inversely with the time of welding. Furthermore, the results indicate that i
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
مشكلة البحث واهميته:-
اخذ موضوع العولمة قدراً وافياً من الاهتمام سواء على المستوى الاكاديمي او على مستوى اجهزة الاعلام والرأي العام ومختلف التيارات السياسية والاقتصادية والاجتماعية ، فلا يخلو أي لقاء اقتصادي او سياسي او اجتماعي من الحديث عن العولمة اذ نشرت العديد من الابحاث والدراسات وعقدت الكثير من الندوات والمؤتمرات لدراسة العولمة وبيان اثارها ولعل ذل
... Show MoreThis study aimed at analyzing and studying the strategic and geopolitical importance of the Sahel region, which increased the regional competition for the resources of the region, especially the energy resources that have been and continue to be one of the axes of conflict and competition between these forces.
The researcher tried to review the competition between the international force, France, the United States of America, China, Algeria and Libya, and the African coast. We note that there is a positive correlation between the severity of the conflict and the intensity of the competition of the major powers to control the countries of the region and the extent of political and economic stability These countries are directly affecte