جريت دراسة مختبرية لمعرفة تأثير الزيت الطيار لقشور ثمار نبات النارنج الصفرC. aurantium تجاه النمو السطحي للفطريات Penicillium expansum، Aspergillus flavus و Fusarium oxysporum ، أظهرت نتائج الفعالية التثبيطية للزيت الطيار تأثيراً معنويا متفاوتاً في الفطريات المشمولة بالدراسة، إذ كان الزيت الطيار أكثر تأثيرأَ في الفطر P. expansum تلاه الفطر A. flavus ،في حين كان الفطر oxysporum F.أقل حساسية تجاه الزيت الطيار. بصورة عامة اظهر الزيت الطيار تأثيرا تثبيطيا طرديا بزيادة التراكيز وصولا الى التركيز 5% (حجم/حجم) الذي اظهر تثبيطا تاما للنمو لجميع الفطريات المدروسة.
The research aims to test the two characteristics of the relationship between accounting profits and the stock returns, to find out the suitability of both of them in explaining the relationship between accounting profits and stock returns for joint stock companies registered in the Baghdad Stock Exchange, also aims to reaching the most appropriate specification for the relationship between the two variables of the company’s stock dealing in the Baghdad Stock Exchange, and get a set of results, the most important of which are: the ability of changing for both of these variables in the profits share and the stock level of the profits does not explain more than 9,9% of the market returns of the Iraqi Joint Stock Companies registered i
... Show MoreAn investigation was provided in this work for the host range of brown soft scale Coccus hesperidum Linnaeus in Baghdad Province. Five plant species were found infected by this insect, three of these species, Citrusaurantium L. (Rutaceae); Nerium oleander L. (Apocynaceae); Ficuscarica L. (Moraceae) reported earlier, and the remaining two, Dahlia pinnata Cav. (Asteraceae) and Myrtuscommunis L. (Myrtaceae) are recordedhere for the first time as host plants for this pest.
The relationships between the related parties constitute a normal feature of trading and business processes. Entities may perform parts of their activities through subsidiary entities, joint ventures and associate entities. In these cases, the entity has the ability to influence the financial and operating policies of the investee through control, joint control or significant influence, So could affect established knowledge of transactions and balances outstanding, including commitments, and relationships with related to the evaluation of its operations by users of financial statements, including the risks and opportunities facing the entity assess the parties. So research has gained importance of the importance of the availability
... Show MoreBP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.
Purpose: This study aims to shed the light on allusions to real lab rats in Dashner’s trilogy: The Maze Runner (2009), The Scorch Trails (2010), and The Death Cure (2011). It also aims to trace the historical documents and chronicles essential to reveal the justifications behind the vague political and scientific crimes. Methodology: The researchers have used the literary analytical approach to study and analyze selected prominent aspects from each novel; such as the concept of lab rats and genocide crimes in The Maze Runner; references to weather experiments, the climate change conspiracy, gas chambers, and the Holocaust in The Scorch Trails; and finally, the man-made diseases and biological weapons in The Death Cure. Results
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreПредметом нашего исследования является вводные слова и их значения в современном русском языке. И прежде чем углубиться в нашу научную работу нам было необходимо определить понятие вводных слов и их функция и место в системе русского языка. По словам В. Г. Лебедева и Л. С. Тюревы "Вводные слова вводятся в предложении, чтобы выражать отношение говорящего к высказываемой мысли, оценки ее содержа
... Show MoreThe research aimed to know the effect of the Parashot strategy in developing the reading comprehension skills of first-grade intermediate students in reading. The researchers put the following two null hypotheses: There is no statistically significant difference at the level (0.05) between the average scores of the experimental group students who study the subject Reading with the Parashot strategy in the pre and post-tests in developing reading comprehension skills as a whole. There is no statistically significant difference at the level (0.05) between the average scores of the experimental group students who study the reading material using the Parashot strategy and the average scores of the control group students who study the same subje
... Show More