The aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive conversion of large farms suitable for growing food to energy production would threaten global food security. In the first ten years of the new millennium, biofuel production increased fivefold, and the largest increase in biofuel production was recorded in 2007-2008, coinciding with a sharp rise in food prices. Compared to the average food prices in the period 2002-2004, the average global prices of cereals, oils and fats traded were 2 to 2.5 times higher in 2008, this continuous increase in the use of food crops to produce biofuels has reflected on global food security. Accordingly, this review article will address previous studies on biofuel production; identify the theoretical framework for the concept of biofuels and its characteristics, and the relationship between biofuels and food security. In this study, we presented biofuels, which are considered one of the important categories in the field of renewable energy and its environmental and economic effects, as well as the experiences of some countries in its production, and the possibility of benefiting from the natural resources available for its production. We will discuss the scientific (chemical) principles of biofuel production.
ABSTRACT
Herbs and spices have long been used to support various food products, including dairy products because of their flavoring, taste, texture and general appearance as well as therapeutic properties such as antioxidant activities, infections, microbes, anti-diabetes and hypertension. Therefore, this study aimed to demonstrate the effect of adding ginger, cinnamon, lycopene extract and olive oil on the physiochemical properties, the quality of the soft cheese produced and the extent of its acceptance by the Iraqi consumer, who prefers this product in abundance to other types of cheese. So, this study was prepared
... Show Morethe study aimed to identify the impact of the types of cooking utensils in transition metal elements to food and the effect of acid and storage in the concentration of these elements. used five types of cooking utensils including aluminum. tefal, astainls steel, glass. (pyrex), and ceramic prepared in it the food meal. the same meals were repeated add to them acid. the estimate of mineral elements in the meal prepared before storage and after storage in refrigerator temperature degree. the result shows the increase of aluminum concentration in the meals that prepared in aluminum pot reaching 2.913 pmm while reached less concentration in the meal prepared in astainls pot reaching 0.325 pmm. the highest concentration of iron reached 25.2 p
... Show MoreThe Importance of Effort and its Impact in Building the Society in the Light of
the Holy Book and Sunna.
Thank for God and peace be upon Prophet Muhammad, His hose hold and
Companions.
This research is to refute a fault : that Islam as a religioncalls for laziness and
dependence and this in first, Second, to show the originality of the Islamic method in
building and construction.
This research Starts with an introduction in which I refer to the nature of the
Islamic method and its way of work in life: that it is a divine method that is achieved
by the effort of the people them selfves and not through a divine extraordinary power:
The research explains the shift in the peoples life who were addressed by this<
Since the advent of the sunrise of the immortal message, Islamic legislation has always established justice and the right guidance, and has prevented any perversion, injustice or corruption, with a divine system that called in its course the characteristics of the legislation on its general basis and its ability to develop, progressivity, and paving the way with a collective approach, accompanied by the worldly and moral punishment. When the corrupters went too far, reformers were delayed and values were missed; Mankind has been afflicted with the scourge of injustice and loss, and has lost sight of the approach that the Creator of the world has given to the people of the world, for what would guide them in their affairs sooner and later
... Show MoreNowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreAbstract
The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.
This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show More