Preferred Language
Articles
/
bsj-29
Evaluation of the Ecosystem Services of the Central Marsh in Southern Iraq
...Show More Authors

Ecosystems provide humans with services that include benefits from food, fresh water, climate regulation, and socio-economic assets. The Mesopotamian marshlands are among the largest wetlands in the Middle East and they provide various benefits. However, ecosystem services of the Marshlands are consistently undervalued in national economic analysis and decision making. This study focusses on the Central Marshes, the first National Park in Iraq, and is the first attempt at valuing a series of ecosystem services from a valuable natural ecosystem in Iraq. We adopted the Toolkit for Ecosystem Services Site-Based Assessment (TESSA) for the determination of biophysical and economic values of services at the site level. Data on key ecosystem services (as determined by 30 interviews with residents of the Marshes) included the trading of fish, harvested plants, water buffalo milk, and fodder were collected across six months in 2014. We valued the ecosystem services within the CM (40,000 ha) over a 6-month period to have a total value of 860,078.23 USD. This estimated total value was the sum of 86,637.25 USD from harvested plants, 551,334.80 USD from trading fish, 167, 303.70 USD from trading water buffalo milk, and 54,804.00 USD from trading fodder. The average income per individual in Iraq in 2014 was 6720 USD (World Bank data - https://data.worldbank.org/country/iraq): thus, the CM provided an average salary for 256 people. Our results provided greater understanding of the ecosystem services contributed by the Central Marshes and has highlighted the crucial role of nature in supporting sustainable well-being for humans living in the area. In addition, the results can be used to enhance local policy, to aid management plans of the National park, and to estimate lost and damage that could result from impact of climate change on the area.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
The Asian Efl Journal
The EFL Students' Academic Buoyancy in Reading and Listening Skills
...Show More Authors

This research aims at identifying the Iraqi EFL students' academic buoyancy in reading and listening skills and then finding out the difference between the two skills; Furthermore, finding out the five predictors differences of each of the two scales. Two academic buoyancy scales used to collect data. After achieving the scales' psychometric characteristics, they are submitted to the study sample. The sample of (100) female students selected according to the stratified random method from the second class at the Department of English\ College of Education for Women\ University of Baghdad. The results show that the students have academic reading buoyancy and have not academic listening buoyancy; the difference between the two abilities shows

... Show More
View Publication Preview PDF
Scopus
Publication Date
Sat Sep 30 2023
Journal Name
Lark
ADJECTIVES WITH THE SUFFIX -OVATE - / - EVAT IN MODREN RUSSIAN LANGUAGE
...Show More Authors

يكشف هذا المقال عن مشكلة الصفات ذات المكون الكمي والتي تعتبر واحدة من اقوى الموارد المكونة للكلمات التعبيرية والتقويمية و يتم تحليل التركيبات الدلالية ذات الاوجه المتعددة التي تنشا من عملية توظيف الصفات المشتقة بمساعدة اللواحق والتي تدل على الاتجاه العام للغات السلافية وذلك لتطوير الدلالات العاطفية والتقييمية في الكلمات ذات معنى الميزة او الخاصية يتم تقديم تعريف انماط تكوين المعاني الضمنية في دلالات

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 21 2025
Journal Name
Iklil For Human Studies
Review Article A Feminist Gothic in the American Literary Fiction
...Show More Authors

Teresa Fitzpatrick presents a connection between oppressed women and the plant of Wisteria in gothic fiction in her article “Wisteria: A Female Eco-Gothic Metaphor in American Fiction Through the Ages.” The connection between women and nature is common in literature as women are usually compared to the beauty or ferocity of flowers, rivers, or natural phenomena in general. The connection extends to the architecture and sort of plants that appear in gothic literature. Gothic novels have routinely been connected to the secrets and life stories of women who cannot have the liberty to live or share them outside their homes. A fearful house with a prisoned person, ghost, or a secret is mostly normally found in gothic writing. Women have exce

... Show More
Preview PDF
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Employing digital marketing through communication in promoting the commercial product
...Show More Authors

In recent years, the means of communication have achieved a great generality that made them occupy, in a short time, the first ranks among the most widely used social networks in the world, due to the many services and advantages offered by this network to its users. It has led to a leap in the field of visual communication, especially since it relies mainly on the image Its dimensions make it a means of communication and transfer of ideas and meanings between the peoples of the world, and it also allows the inclusion of digital advertising content using multimedia with a degree of professionalism in other social networks, which allowed the various segments of society the opportunity to invest this network in their businesses of differen

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The Technical Mediator in Arab Theater: Their Tools and Skills
...Show More Authors

The artistic mediation in theater connects the human elements with the material elements in the theatrical production process. The human artistic mediator plays a crucial role in achieving the artistic and expressive goals of the theatrical work, requiring high skills and expertise. Their role involves coordinating and executing the technical aspects of production, such as lighting, sound, set design, costumes, and acting, using their skills and techniques to transform the theatrical text into a successful stage performance. The artistic mediator significantly impacts the quality of the theatrical work and creates a distinct viewing experience for the audience. Technological advancements and continuous updates in theater contribute to th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Women and Ideology in the Feature Film: بان جبار خلف
...Show More Authors

The topic of research (women and ideology in the feature film) is a series of researches addressed by the researcher on the subject of women in the feature film through studying the ideology as a thought and political system not only limited to the world of men, but women had a significant contribution in this area.  The research identified the problem and its need as well as the objectives of the research and clarified its limits and importance. The research also identified the theoretical framework, which included the following axes: personality and ideology, film and ideology, then women and ideology in the film.

After the completion of the theoretical framework, the research concluded a set of indicators of the theoretic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
The Graphic privacy in vector graphics design for children's publications
...Show More Authors

         The graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Evaluating the Crop Coefficient for Cherries Plants in Michigan State
...Show More Authors

Crop coefficient for cherries was evaluated by measure the water consumption in Michigan State to find its variation with time as the plant growth. Crop coefficients value (Kc) for cherries were predicated by Michigan State University (MSU) and also by Food and Agriculture Organization (FAO) according to consume of water through the season. In this paper crop coefficients for cherries are modified accordingly to the actual measurements of soil moisture content. Actual evapotranspiration (consumptive use) were measured by the soil moisture readings using Time Domain Reflectometers (TDR), and compared with the actual potential evapotranspiration that calculated by using modified Penman-Monteith equation which depends on metrological statio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 08 1999
Journal Name
Abhath Al- Yarmouk [basic Sciences And Engineering]
Model for Predicting the Cracking Moment in Structural Concrete Members
...Show More Authors

Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref