The research aims to measure the net nominal protection coefficients for the products table eggs and poultry meat and the extent of its impact on domestic production volume for the period of 1990- 2013 has been the use of mathematical formulas simplified in the calculation of the transaction process with a view to the extent of support and protection offered by the state pricing policy for products Resources Sector Animal in Iraq and reach search Highlights and most important, there are volatile price state policy with regard to eggs and poultry meat, as it ranged net nominal protection coefficients between the larger and less than the right one, which means that values are unstable to support local producers or consumers, and can be The reason is that the wars that the country went through the circumstances of whether economic or political, as well as the exchange rate policies of the local currency overvalued and which makes the prices of imported goods seem relatively less than the domestic prices.
Cyberbullying is one of the biggest electronic problems that takes multiple forms of harassment using various social media. Currently, this phenomenon has become very common and is increasing, especially for young people and adolescents. Negative comments have a significant and dangerous impact on society in general and on adolescents in particular. Therefore, one of the most successful prevention methods is to detect and block harmful messages and comments. In this research, negative Arabic comments that refer to cyberbullying will be detected using a support vector machine algorithm. The term frequency-inverse document frequency vectorizer and the count vectorizer methods were used for feature extraction, and the results wer
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show MoreIs a day or series of days celebrated by Jews for religious or worldly important event in Jewish history as an occasion in Hebrew is called Eid יום טוב good day or good or חג תענית celebrate the festival or celebration. Most of the Jewish holidays are of a religious nature, and there is a worldly character with festivals such as the Festival of Lights חג החנוכה the holiday of Purim and the holidays, although a religious appearance, but she celebration in mundane aspects of the history and traditions of the Jewish occasions. Mass over the holidays when Jews are those mentioned in the Bible in my Leviticus and Deuteronomy. And some holidays established by rabbis in the vicinity of the anc
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show Moreالملخص ان حق الملكية هو الحق الاوسع نطاقا يمنح صاحبه صلاحية ممارسة السلطات كافة ويكون محل هذه السلطات كل ما يملك الشخص سواء كان شقه او طبقة اسوة بالعقارات الاخرى كدار للسكن او ارض ، ومن اهم هذه السلطات واوسعها نطاقا ( هو سلطة التصرف ). تعد هذه السلطة جوهر حق الملكية وأخطر السلطات الممنوحة للمالك كونه بواسطتها يمكنه الاستغناء عن ملكه بأي تصرف ناقل له كالبيع أو الهبة او الوصية مثلا ، ولأهمية هذه السلط
... Show MoreIn this paper, making use of the q-R uscheweyh differential operator , and the notion of t h e J anowski f unction, we study some subclasses of holomorphic f- unction s . Moreover , we obtain so me geometric characterization like co efficient es timat es , rad ii of starlikeness ,distortion theorem , close- t o- convexity , con vexity, ext reme point s, neighborhoods, and the i nte gral mean inequalities of func tions affiliation to these c lasses
The research investigates the term innovation and its role in elaborating architectural practice based on diffusion. The complexity of the architectural field compared with other fields shows a problem in explaining how innovations in architecture diffuse as a thought and act in a certain context of practice. Therefore, the research aims to build an intellectual model that explains the way personal thoughts resembled by unique models introduced by creative and innovator designers diffuse in a certain pattern elaborate these models into a state of prevailing thought resembled by the movement in architecture. The research will apply its model to the more comprehensive movement in architecture, which is the modern movement,
... Show MoreLet R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if
the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are introduced and given some properties .
This study aimed to extract, purify, and characterize the protease of local Okra Abelmoschus esculentus pods. The extraction process was conducted using ten extraction solutions with different pH and ionic strength values. Phosphate buffer solution with (pH 7, 0.05M, containing 2% sodium chloride) gave the highest activity which was (7.2 Unit/ml) as compared to other solutions, which ranged from 0.8-5.9 Unit/ml. The extracted enzyme purified by several stages. Being, precipitation by gradual addition of Ammonium sulphate from 20 to 85% saturation, then the precipitated enzyme was dialyzed and fractionated through DEAE-Cellulose (22X1.1cm), the enzymic fractions were pooled. The specific activity, purification fold and the enzyme yield value
... Show MoreDigital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different
... Show More