على الرغم من تحقق ثورة هائلة وطفرة نوعية في مجال تكنلوجيا الاتصالات في دول العالم الا ان بلدنا كان محروما من التمتع بهذه التقنيات الحديثة في ظل النظام السابق, وبعد سقوط النظام ووجود بحبوحة من الحرية، دخلت الكثير من هذه التقنيات الى العراق ومنها الموبايل والانترنيت وغيرها من وسائل الاتصال المتطورة.
ويقول (Smith & Fletcher, 2001) في كتابهما Inside Information
... Show MoreThe using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible parametric models and these models were nonparametric, many researchers, are interested in the study of the function of permanence and its estimation methods, one of these non-parametric methods.
For work of purpose statistical inference parameters around the statistical distribution for life times which censored data , on the experimental section of this thesis has been the comparison of non-parametric methods of permanence function, the existence
... Show MoreThe objective of the study is developing a procedure for production and characterization of rice husk ash (RHA). The effects of rice husk (RH) amount, burning/cooling conditions combined with stirring on producing of RHA with amorphous silica, highest SiO2, lowest loss on ignition (LOI), uniform particle shape distribution and nano structured size have been studied. It is concluded that the best amount is 20 g RH in 125 ml evaporating dish Porcelain with burning for 2 h at temperature 700 °C combined with cooling three times during burning to produce RHA with amorphous silica, SiO2 90.78% and LOI 1.73%. On the other hand, cooling and stirring times affect the variation of nano structured size and particle shape dis
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreFaintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
لمقدمة
الحمد لله رب العالمين والصلاة والسلام على سيد الأنبياء والمرسلين نبينا محمد صلى الله عليه وسلم وعلى واصحابه أجمعين ومن تبعهم وأهتدى بهداهم الى يوم الدين اما بعد :
فوظيفة القضاء وظيفة سامية يراد منها اقامة العدل ولا يستقيم حالهم الا به دفعاّ للظلم ، ولقد اولى النبي صلى الله عليه وآله وسلم ومن بعده الخلفاء الراشدون
... Show MoreThis study deals with The Millstone (1965) which is a dramatic depiction of a single
mother heroine in a classic predicament. This novel is considered as representative of the age
in which it was written. The primary theme is her intense preoccupation with questions of
fatalism and will. The work also involves, both explicitly and implicitly, feminist concerns.
Because the central protagonist is a woman and the society in which she lives is depicted,
accurately, as deeply patriarchal and class-bound, the problem of the individual's capacity for
self-determination is inevitably tied to the feminist perspective.
هدف الدراسة معرفة التأثير السمي التراكمي للأعلاف الملوثة بالحنطة المتفحمة على أفراخ فروج اللحم .اجري هذا البحث في مختبرات الصحة الحيوانية التابعة لوزارة العلوم والتكنولوجيا استعمل 78 فرخاً لهذه التجربة قسمت إلى ستة مجاميع ربيت في أقفاص خاصة أعدت لهذا الغرض. تم تغذيتها يوميا على أعلاف ملوثة حسب برامج التغذية المتبعة , تمثلت المجموعة الأولى بمجموعة السيطرة والتي غذيت على عليقه تحوي الحنطة
The current research aimed to investigate the psychometric characteristics of the Arabic version of the Nomophobia scale for the Omani youth. The scale was administered to a random sample of students from public and private universities and colleges in Oman. The research sample consisted of 2507 students, of whom 868 males and 1639 females. The validity of the measure was first checked by presenting the scale to a group of experts in this field. Then the exploratory and confirmatory factor analysis was carried out. The exploratory factor analysis revealed the existence of three main factors: the fear of connectivity loss, the fear of communication loss with others, and the fear of network outages. These factors accounted for 65.6% of the
... Show More