Preferred Language
Articles
/
abaa-390
Trends of journalists and consumers about the phenomenon of food fraud
...Show More Authors

Food comes after air and water in terms of importance in the survival of human beings, In addition, it is the support and strength of health and support, if lost or destroyed man would die or get sick and become a heavy burden on himself and his society. Food, like other sources of life, is subject to various risks and corruption comes from countless sources. Among these dangers is the result of spontaneousness, lack of knowledge or compulsion due to the interaction of variables beyond the will of the producer and the consumer, such as pollution of water, air and environment and their reflection on food consumed by people. However, we can’t deny that some reasons of corruption are intentional and resulting from a planning in advance in order to make an illegal profit at the expense of people's health and safety. The importance of provision of food these days has increased as the number of sources of fraud and manipulation of its components has increased, not to mention the variety of cheating and scamming methods that accompany it from the factory until it reaches the consumer. Increasing the population and increasing the need to feed millions of people in different countries of the land led to an increase in quantities of materials transferred, pre-processed and packed, which are prepared through complex manufacturing processes and go through multiple hands starting from the farm to shipping then factory and storage and finally supply in the wholesale and retail markets. There is no question that all those who follow the food chain have interests and goals that come primarily from profit. It is not surprising that many of them seek to maximise their personal benefit and avoid potential losses, even at the expense of consumers. Here comes the role of the important mediator in the transfer of knowledge and warning, which warns of dangers resulting from consumption of adulterated food and there is no doubt that various media are the main role of this mediator in contemporary society. A thorough understanding of consumer behavior will provide marketing managers with a better idea of ​​how marketing activity works and help them develop a more efficient and capable marketing strategies. Predictability of consumers' behavior and purchasing motivations that reflect their desires and needs will help develop appropriate marketing policies. Future consumer behavior can provide information and insight into consumer decisions, allowing to identify the relationship between attitudes of consumers and journalists towards the phenomenon of cheating in food. We hope this research would provide an objective picture of these trends and study the relationship between perception and knowledge of journalists about the phenomenon under study and the impact on attitudes of consumers, also to indicate the success of press in raising awareness and guidance of the audience by analyzing the press coverage of this phenomenon during the research period. This research aims to reach an answer to a number of questions related to the trends of consumers and journalists about the phenomenon of the lack of food. These questions relate in fact to the basic components of trends, specifically the behavioral and cognitive aspects and related views. The Iraqi press in the field of combating the phenomenon of cheating in food stuffs, whether through identification of the mechanism of work or through the technology of this phenomenon in 2001.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 05 2019
Journal Name
Iraqi Journal Of Physics
Ag-SiO2 nanoparticales prepared by Sol-Gel methods for antibacterial effect
...Show More Authors

Sol-gel method was use to prepare Ag-SiO2 nanoparticles. Crystal structure of the nanocomposite was investigated by means of X-ray diffraction patterns while the color intensity was evaluated by spectrophotometry. The morphology analysis using atomic force microscopy showed that the average grain sizes were in range (68.96-75.81 nm) for all samples. The characterization of Ag-SiO2 nanoparticles were investigated by using Scanning Electron Microscopy (SEM). Ag-SiO2 NPs are highly stable and have significant effect on both Gram positive and negative bacteria. Antibacterial properties of the nanocomposite were tested with the use of Staphylococcus aureus (S. aureus) and Escherichia coli (E. coli) bacteria. The results have shown antibacteri

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2016
Journal Name
Journal Of Engineering
Critical Success Factors in Construction Projects (Governmental Projects as a Case Study)
...Show More Authors

The importance of the construction sector and its Great role in the provision of services and infrastructure, reduce poverty, improve living conditions and improve the economic situation in the country, impose attention to the way in which the projects implemented for its improvement and to get successful projects. The objective of this research was to determine the criteria for success as well as critical success and failure factors that have a significant impact on project success. A selected 75 engineer (department managers, project managers and engineers) are asked to fill  the questionnaire form, Sixty-seven valid questionnaire forms were analyzed statistically to get search results, which were as follows : Twe

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2022
Journal Name
Alustath
Metrical Phonology in Modern Arabic Poetry
...Show More Authors

Providing stress of poetry on the syllable-, the foot-, and the phonological word- levels is one of the essential objectives of Metrical Phonology Theory. The subsumed number and types of syllables, feet, and meters are steady in poetry compared to other literary texts that is why its analysis demonstrates one of the most outstanding and debatable metrical issues. The roots of Metrical Phonology Theory are derived from prosody which studies poetic meters and versification. In Arabic, the starting point of metrical analysis is prosodic analysis which can be attributed to يديهارفلا in the second half of the eighth century (A.D.). This study aims at pinpointing the values of two metrical parameters in modern Arabic poetry. To

... Show More
Publication Date
Tue Nov 01 2022
Journal Name
Res Militaris
Metrical Phonology in Modern English Poetry
...Show More Authors

One of the main aims of Metrical Phonology Theory (MTT) is to provide the stress of poetry on the syllable, the foot, and the phonological word levels. Analyzing poetry embodies one of the most prominent and controversial metrical issues as the subsumed number and types of syllables, feet, and meters are balanced compared to other literary texts. The MTT saw the light during the late seventies (1975) and (1977) by Liberman and Prince, who produced it as part of non-linear phonology. Its roots originated in prosody, which studies poetic meter and versification. The basis of the metrical analysis is the prosodic analysis developed in London by Firth and his students in 1950. This study aims to identify the values of five metri

... Show More
View Publication Preview PDF
Scopus
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Teen-Computer Interaction: Building a Conceptual Model with Thoughts- Emotion-Behaviour
...Show More Authors

Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Wed Oct 10 2018
Journal Name
Al-kindy College Medical Journal
Recurrent Laryngeal Nerve Injury With Versus Without Nerve Identification In Different Thyroidectomy Procedures
...Show More Authors

Background: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.

Type of the study: cross –sectional study.

Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Notes on Approximately Pure Submodules
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Fuzzy Wavenet (FWN) classifier for medical images
...Show More Authors

 

    The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.

  In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.

&n

... Show More
View Publication Preview PDF
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
An Investigation into Heat Transfer Enhancement by Using Oscillating Fins
...Show More Authors

The present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref