In this study, we sought to identify in detail all that relates to the social and solidarity economy in terms of its foundation, including historical development, philosophical basis, legalization and its associated concepts, characteristics, objectives, elements and obstacles, especially after the ways of achieving social justice attracted several individual, socialist and Islamic philosophies , Each seeks to understand them in different ways and methods while denying the means and methods of other philosophies in this framework, emerged some of the tools that may have received the consensus of the theoreticians and supporters of all those ideologies, namely, social responsibility and cooperative insurance and cooperatives and other This is a focus on Iraq as it represents a fertile medium for the growth and growth of these applications, especially the primitive ones, which were and still are spreading and expand to reach the non-traditional economic actors such as women and my family And enable them to contribute strongly to economic activity to realize social justice and to promote new, alternative and innovative financing instruments and access to the real economy that seeks to produce goods and services and meet the needs of people. Da for the goal of achieving the maximum profit.
Many clinical isolates of proteus spp. (30 isolates of P
mirabilis and 30 isolates of P. vulgaris) from patients with urinary
tract infections (UTIs) were examined for their ability to produce
proteolytic enzymes and their ability to form swarming growth. Most
(90%) of P. mirabilis and 60% of P. vulgaris isolates secreta
proteolytic enzymes. A strong correlation was found between the
ability of a strain to secreted proteases and it's ability to form
swarming growth. Non- swarming isolates invariably appeared to be
non- proteolytic. However, some isolates (12 isolates of P. vagaries)
were non- proteolytic even when they formed swarming growth
There are no single materials which can withstand all the extreme operating conditions in modern technology. Protection of the metals from hostile environments has therefore become a technical and economic necessity.
In this work, for enhancing their wear-resistance, boride layers were deposited on the surface of low carbon steel by a pack cementation method at 850 °C for (2, 4, and 6) h using vacuum furnace. The boronizing process was achieved using different concentration of boron source (20, 25, and 30) % wt. into coating mixture to optimize the best conditions which ensure the higher properties with lower time. The coating was characteristic by X ray diffraction (XRD), and it is confirmed t
... Show MoreThe stanza in the sonnet has been defined as a set of poetic lines followed after proem
and be the same meter as that of proem in complete stanza, but in rhyme scheme different
from that meter. The couplet is defined as set of poetic lines that followed the stanza and be as
the same meter as that of stanza, but with different rhyme scheme. This definition is approved
by all specialized in field of Andalus literature and it was also proven to them that this
construction emptied of indications. This meter has endeavored to prove that that there were a
difference in denotation for meaning between the stanza and couplet. Thus, the sonneteers
have outweighed the sonnet of the blind "Tutaili" to their sonnets as they felt
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More<span>Digital audio is required to transmit large sizes of audio information through the most common communication systems; in turn this leads to more challenges in both storage and archieving. In this paper, an efficient audio compressive scheme is proposed, it depends on combined transform coding scheme; it is consist of i) bi-orthogonal (tab 9/7) wavelet transform to decompose the audio signal into low & multi high sub-bands, ii) then the produced sub-bands passed through DCT to de-correlate the signal, iii) the product of the combined transform stage is passed through progressive hierarchical quantization, then traditional run-length encoding (RLE), iv) and finally LZW coding to generate the output mate bitstream.
... Show More