Despite Iraq's possession of the energies material, human and agricultural resources and great economic but that contribution of the agricultural sector in the total gross fixed capital formation and gross domestic product in the Iraqi economy remained low and declining continuously since the nineties of the last century, as well as the inability of agricultural production to meet the country's needs of food . The food gap increased strategic food crops until it reached 1049 thousand tons in 2010. On this basis, there is a need to study and analysis the behavior of the function of gross fixed capital formation and its relationship with Gdp in the agricultural sector. Hence the importance of this study is to analysis the reality and trends gross fixed capital formation and domestic product in the agricultural sector for the period (1980-2010) and its rates of growth in an attempt to determine the causal relationship (Granger) between these two variables, where the results indicate a lack of stability of data series variables (Cap) and (Gdp) at the level of their stability after taking its first differences and the existence of a common integration relationship deltoid and explain the relationship between long-term variables where the causal relationship appeared (Granger) destined of Gdp to gross fixed capital formation Cap. The result show that the compounding rates of growth for both Cap and Gdp were negative throughout the studied period (1980 -2010) , and , also declining the relative important of these variable in the Iraqi economy especially during the period 2003 -2010 which represent the deterioration in the infrastructure of Iraq in agriculture sector
In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fundamental tools of the forward error analysis are system of linear absolute and relative a prior and a posteriori error equations and associated condition numbers constituting optimal of possible cumulative round – off errors. The condition numbers enable simple general, quantitative bounds definitions of numerical stability. The theoretical results have been applied a Gaussian elimination, and have proved to be very effective means of both a prior
... Show MoreReceipt date:11/19/2020 acceptance date:10/1/2021 Publishing date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
Human rights are one of the basic concepts of modern and contemporary times, and political thought as the origin of political science and its source of knowledge have impact in this science and its branches
... Show MoreIn this research, we present a nonparametric approach for the estimation of a copula density using different kernel density methods. Different functions were used: Gaussian, Gumbel, Clayton, and Frank copula, and through various simulation experiments we generated the standard bivariate normal distribution at samples sizes (50, 100, 250 and 500), in both high and low dependency. Different kernel methods were used to estimate the probability density function of the copula with marginal of this bivariate distribution: Mirror – Reflection (MR), Beta Kernel (BK) and transformation kernel (KD) method, then a comparison was carried out between the three methods with all the experiments using the integrated mean squared error. Furthermore, some
... Show MoreWithin connected speech, RP speakers tend to shorten stressed long vowels end diphthongs in pre. Forties consonants in the same syllable on the basis of complementary Distribution, i.e., the phonological environment decides the influence of the forties plosives and fricatives, as far as they are in find position preceded by stressed long vowels and diphthongs, or particular voiced consonants plus vowels. The Iraqi learners, then, face.
Magic is an attempt to affect people or events either by cheating and charlatanry means or by expecting devil powers in order to bring advantage or to avoid a harm or to bring harm to others or to for see the future and divition .
Magic is either real by the devil like writing majic works to prevent the marriage of someone and to depart the husband and his wife , causing someone to be distressed the physical and nervous diseases and stopping the stories and the project; majic can be artificial by being intellect and legerdemain and different types of triks and to cancel the magic by using magic or by protecting the self by using Talismans as well as presenting or offering sacrificers to the masters and th
... Show MoreThe aim of the present research is to study the dissolution and transport process of
benzene as a light nonaqueous phase liquid (LNAPL) in saturated porous media.
Unidirectional flow at water velocities ranged from 0.90 to 3.60 cm/hr was adopted to study
this process in a three dimensional saturated sand tank (100 cm×40 cm×35 cm). This tank
represents a laboratory-scale aquifer. The aquifer was constructed by packing homogeneous
sand in the rectangular tank. The experimental results were used to characterize the
dissolution behavior of an entrapped nonaqueous phase benzene source in a three dimensional
aquifer model. The time invariant average mass transfer coefficient was determined at each
interstitial velocit
The aim of this study is to survey and make to revision the genera and species of Chloropidae fauna of Iraq. The investigation showed four species belonging four genera, which belongs to two subfamilies, and one unidentified species belonging to the genus Elachiptera Maquart, The specimens were compared with stored insects at Department of Entomology and invertebrates, Iraq Natural History Research Center and Museum.
The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject shou
... Show MoreThe study was enriched by examining (Islamic Sharia’s position on the phenomenon of bullying) becausee bullying is a recurring aggressive behavior that Is one of the types of violence directed by a person or group of prsons; With the intent of deliberately harming and offending anotherr person or group of persons, It has several verbal, physical, electronIc or other formsforms Bullies may follow a policy of Ientimidation or intimidation, as well as ridicule; In order to belittle the victim .The study aims to know the Islamic Sharia ruling on bullying as a modern term for a content that Is as old as man, and the study reached several results, Including: Islam’s affirmation of the prohibition of this phenomenon In word, deed and gesture,
... Show More