The aim of this research was to indicate the opinion of the Iraqi consumer awareness of the risks associated with consuming canned food, the questionnaire was included 20 questions for label information, consumer culture, shopping, marketing, awareness and knowledge as a tool to survey the opinions of 300 consumers in Baghdad, the data was analyzed by using percentage, weighted mean, and weight percent, the results obtained showed that the Iraqi consumer need more information, training and guidance programs in food safety handling issue for canned food, especially in analysis of label information and growing of consumer culture for shopping, right marketing, awareness and knowledge.
This study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th
... Show MoreWaste is one of the most important problems affecting the city’s environment and its urban landscape, which results from the activities and activities of man and the natural environment. Its sources have varied between residential, commercial, industrial, medical and hazardous, and its spread in cities, on roads and on abandoned open lands, has led to significant negative effects and risks to human health and the environment.
Therefore, there were serious attempts to deal with waste and follow sequential steps that formed a waste management system such as (collection, sorting, transport, then treatment and disposal). Preventing and reducing waste, then recycling and recovering by composting or burning, and ending with bu
... Show MoreThe importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreSome biological aspects of the zebra mussel, Dreissena polymorpha have been studied at Al-Musayab thermal power plant ,sixty km. south west of Baghdad. Data collected during the period extended from November, 2002 to October, 2003 except for the month of April The population consisted of five age groups; O, I, II, III, and IV which have 0, 1, 2, 3 and 4 annuli respectively. The study also proved the validity of annuli readings for age and growth determination. The average annual growth rates for age groups O,I, II, III, and IV were 5.7, 5.5, 5.4, 5.2 and 5.4 respectively. Average calculated length for laboratory reared mussel was 2.5 mm compared to 5.4 mm in natural environment. Correlation coefficients were very high between age an
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreDensity Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.
An aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical
... Show Moren this research, some thermophysical properties of ethylene glycol with water (H2O) and two solvent mixtures dimethylformamide/ water (DMF + H2O) were studied. The densities (ρ) and viscosities (η) of ethylene glycol in water and a mixed solvent dimethylformamide (DMF + H2O) were determined at 298.15 K, t and a range of concentrations from 0.1 to1.0 molar. The ρ and η values were subsequently used to calculate the thermodynamics of mixing including the apparent molar volume (ϕv), partial molar volume (ϕvo) at infinite dilution. The solute-solute interaction is presented by Sv results from the equation ∅_v=ϕ_v^o+S_v √m. The values of viscosity (B) coefficients and Falkenhagen coefficient(A) of the Jone-Dole equation and Gibbs free
... Show More