The concept of tolerance is gaining its importance in the midst of an international society suffering from violence, wars and internal and international crises. It is practiced by extremist and extremist forces and movements acting in the name of religion to exclude the different Muslim and non-Muslim people according to the unethical practices and methodologies of Islamic law and reality. , Cultural, civilization .. that distinguish our world today. The society today is suffering from the ideas of the intellectual and aesthetic views of the different ideologically, ethnically, culturally and religiously in the world of the South. This is what the end-of-history thesis of Fukuyama and the clash of civilizations represented to Huntington. Therefore, it is necessary to confront these extremist and extremist ideas and behaviors. Peace, security and freedom in the international community of justice and equality, needs to be addressed intellectual, cultural, moral and political before they are legal, these treatments are based on dialogue and cooperation and trust and respect and mutual recognition and tolerance so we find the importance of tolerance to The international community is concerned about the need for mechanisms that confront terrorism and violence with an ideology based on respect for the right of diversity, diversity and pluralism. Accordingly, tolerance is a political, cultural and moral necessity based on international legal foundations represented by the United Nations. Through its conferences, declarations and international resolutions issued by it and its specialized agencies, culminating in the Universal Declaration of Tolerance and the International Day of International Peace, and the political foundations represented by democracy and global citizenship that respects all identities and seeks to respect the rights of other identities under the umbrella of international identity Nsanhuahdh respects everyone, a society with a humanitarian goal of a global civil and Ahdlaaaraf borders and the identity of certain Qomahdolh, cultural and educational foundations through plans and programs with educational encourage a spirit of tolerance and world peace. The study was divided into three topics: the first dealt with the concept of tolerance and world peace, and the second topic dealt with the impact of international law and citizenship. In the promotion of world peace "as one of the elements of global tolerance. The last topic included" the role of democracy and education education "in the promotion of world peace and concluded the study by conclusion.
In this paper, we study the incorporation of the commensalism interaction and harvesting on the Lotka–Volterra food chain model. The system provides one commensal prey, one harvested prey, and two predators. A set of preliminary results in local bifurcation analysis around each equilibrium point for the proposed model is discussed, such as saddle-node, transcritical and pitchfork. Some numerical analysis to confirm the accruing of local bifurcation is illustrated. To back up the conclusions of the mathematical study, a numerical simulation of the model is carried out with the help of the MATLAB program. It can be concluded that the system's coexistence can be achieved as long as the harvesting rate on the second prey population is
... Show MoreThis research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MorePregnancy is a stressful condition in which many physiological and metabolic functions are altered to a considerable extent . Pregnancy is a physiological state accompanied by a high-energy demand and an increased oxygen requirement. The present study aim to study selenium ,zinc cupper in the first trimester of pregnancy. The study group comprised of Fourty five pregnant women and twenty six non pregnant women as control . The samples were taken from pregnant women who come to several heath center in Baghdad city to cheak up. Laboratory investigations including Cupper, Ceruloplasmin, Total Antioxidant (TAA), malondialdehyde (MDA), glutathione (GSH), Zinc, Uric acid, and Selenium had been measured in pregnant women and control . Th
... Show More-convex sets and -convex functions, which are considered as an important class of generalized convex sets and convex functions, have been introduced and studied by Youness [5] and other researchers. This class has recently extended, by Youness, to strongly -convex sets and strongly -convex functions. In these generalized classes, the definitions of the classical convex sets and convex functions are relaxed and introduced with respect to a mapping . In this paper, new properties of strongly -convex sets are presented. We define strongly -convex hull, strongly -convex cone, and strongly -convex cone hull and we proof some of their properties. Some examples to illustrate the aforementioned concepts and to cl
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show More