A laboratory experiment was carried out and repeated at field of College of Agricultural Engineering Sciences, University of Baghdad in 2017. First factor was three cultivars of lupine 'Giza-1', 'Giza-2' and 'Hamburg'. Second factor was three seed weights (lower weight, medium weight and higher weight) which was following the cultivars factor. Nested design was used. Results showed supremacy of 'Giza-1' cultivar significantly and gave higher germination ratio, radical length, seedling dry weight, seedling vigour index, field emergence ratio, plant height and number of leaves per plant. The treatment ('Giza-1'×higher seed weight) was supremacy significantly and gave higher germination ratio, radical length, plumule length, and seedling vigour index, while the treatment ('Giza-1'×lower seed weight) was supremacy significantly and gave higher seedling dry weight, field emergence ratio and number of leaves per plant. It can be concluded that the studied cultivars have potential energy related to the nature of their genotype, which makes them different in their behavior under laboratory and field conditions. The interaction between cultivar and seed weight has a role at the variance of this behavior under a wide range of environmental conditions. Therefore, it can be recommended to cultivate seeds with a lower weight of Giza-1.
The present work focuses on examining the strategy of cognitive trips and the Arabic language teachers’ training needs of such a strategy when teaching Arabic language courses in the Saudi Arabia Kingdom. To achieve the objective of the study, and check whether this strategy is used in lesson planning, lesson teaching, or lesson assessment, a descriptive approach and a questionnaire have been adopted. The researchers used a number of statistical tools, and chose a purposive sample, which consists of (58) Arabic language teachers from Saudi Arabia Kingdom. Results have shown that the training needs of Arabic language teachers for implemining the strategy of cognitive journeys while teaching Arabic language courses came in the following
... Show MoreThe implicit is the narrative technique used to give indirect hidden messages. To read between the lines means to understand the implicit meaning that is not directly indicated. This technique is expressed in two forms: the hypothesis and the implications of linguistic and non-linguistic rules. Nathalie Sarraute’s "Pour un oui ou pour un non" states this narrative method through her character’s verbal and non-verbal dialogue. The present paper discusses the implicit method and shows the reason behind which the author uses it in her play "Pour un oui ou pour un non".
Résumé
... Show Moreبسمة الأوقاتي/ أكاديمية وباحثة في العلاقات الدولية تولي الرئيس الأمريكي دونالد ترامب منصبه لولاية ثانية في العشرين من كانون الثاني / يناير من هذا العام (2025) وهو أكثر تمسكاً بعقيدته السياسية التي كان عنوانها في ولايته الأولى (أمريكا أولا / America First) وحاملا لتوجهات جيوسياسية جديدة ومثيرة للجدل
The study has tackled three important variables on the strategic and organizational level, that are : (Administrative skill, strategic Entrepreneurship and organizational flexibility). Through the statistical analysis is, the research hers have sought to identify the relation among them. The study has been applied on a sample of (44) private banks in Iraq. A questionnaire, which has been designed according to a number of international standards, has been used. It's made of (29) items that cover the three variables to test their hypotheses. A number of statistical tools have been used A number of conclusion have been reached and recommendations have also been suggested.
The expansion of the social media environment has created its own linguistic realities which involve more colloquial communication and practical employment of language. This research focuses on nominalizations in detail, which are originally formed words that have been changed for a noun role. These nominalizations are examined within the context of Facebook posts. The research aims to discover the various nominalizations used and how often they appear in a large sample of data from Public Facebook Posts Corpora. Computational linguistics opened new fields of study and enabled researchers to study large amounts of data easily, making it easier to identify patterns. Two computational methods of identifying nominalization in a large dataset w
... Show MoreOur study comes up to clarify the role of television in spreading the culture of violence with a child. This study represents one of the important studies that have tried to highlight the impact of these programmes, particularly cartoons, on the child's behaviors, actions and acquired habits.Violence considers a common phenomenon among the people, as the role of the media, particularly TV has a vital role due to its properties, characteristics and its significant impact on different segments and groups in society and in children particularly through exposure to programmes of films.The results of the study have been affected by the rising proportion of females to males, and that the contribution of real life has a big role in the child ac
... Show MoreThe trading banks in Iraq invest their funds according to regulations imposed by the Central Bank in Iraq in different financial fields like stock exchanges, acquire stocks as assets that could be sold at any time as well as make loans and contributing in corporations establishment also magnitude foreign capital through direct contacts with foreign exchange markets.
We can summarize the problem of this paper as shortage in mathematical models that used in studying and analyzing these investments and according to this problem we used (a constructed mathematical model ) consists of three major indicators: profitability of total investment assets which is divided into three sub-indicators: owners equity risk indicator, debits risk i
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers and his family and companions.
The study of the jurisprudential opinions of scholars, their choices, or their weightings, sheds light on the approach they followed in their choices, and reveals the originality of the scholar or his influence on those who preceded him from among the scholars.
And the commentators of the noble hadith of the Prophet have their important contributions in this aspect, as they undertake the task of explaining the noble hadith, the second source of legislation
Contemporary commentators have their share in the service of the honorable hadith, and the statement of their choices and preferences, and am
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the