يلعب القطاع الصناعي التحويلي في أي قطر دوراً هاماً في تحقيق التنمية الصناعية، اذ تتحد تاثيراته فيها على طبيعة الدور المرسوم له وعلى مدى فاعلية هذا القطاع الحيوي الذي يعد اتجاه نحو التعاظم المضطرد لمستويات الانتاجية " Levels of productivity"والتنويع الانتاجي والتدفق المستمر للتجديد التكنولوجي من اهم دلائله.
ويعد مؤشر الانتاجية بصفة عامة وانتاجيتي العمل وراس المال بصفة خاصة من الم
... Show MoreIn the hybrid coolingsolar systems , a solar collectoris used to convertsolar energy intoheat sourcein order to super heat therefrigerant leave thecompressor,andthisprocess helpsin the transformation ofrefrigerant state from gaseous statetothe liquid statein upper two-thirdsof thecondenserinstead of the lower two-thirdssuchas in thetraditional air-conditioning systems and this willreduce theenergyneeded torun the process ofcooling.In this research two hybrid air-conditioning system with an evacuated tube solar collector were used, therefrigerant was R22 and the capacity was 2 tons each.The tilt angle of the evacuated tube solar collector was changed and the solar collector fluid was replaced into oil instead of water.A comparison wasi
... Show MoreSoil defilement with "raw petroleum" is a standout amongst the most across the board and genuine ecological issues going up against both the industrialized and oil country like Iraq. Along these lines, the impact of "raw petroleum" on soil contamination is one of most critical subjects that review these days. The present examination expects to research "unrefined oil"effectson the mechanical and physical properties of clayey soils. The dirt examples were acquired from Al-Doura area in Baghdad city and arranged by the "Brought together Soil Grouping Framework (USCS)" as silty mud of low pliancy (CL). Research center tests were done on contaminated and unpolluted soil tests with same thickness. The dirtied tests are set up by blending
... Show MoreVascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreReceipt date: 8/8/2020 acceptance date: 9/11/2020 Publication date: 31/12/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
The American-Iranian relations have been characterized by tensions since the arrival of the guardian jurist regime in Iran to leadership in 1979, as it was considered a turning point not only in the cont
... Show More
The Ash'aris and their position on faith, An Ideological Study
Omed AbdulQader rasool
College of Islamic Sciences/Salahaddin University-Erbil
Abstract
The concept of faith is very complex, and there are a lot of talk about it among the major Islamic groups such as the Kharijites, the Mu'tazila, the Jahmiyya and others, because of its great importance, and the worldly and eschatological effects it entails according to the elements of faith such as recognition, ratification and action.
The researcher chose one sect, which is the
... Show MoreHumans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More