It is known that energy subiect has ocuppied a lot of scientests minds about
how to treat the traditional energy and the renewing energy . we know that
most traditional energy coal , oil , Natural gas, neuclear fuel , are limited
guantiy and alsow subjected to be ended .Statics studies refer to reserve
of oil in world will exhausted btween ( 2075- 2100) and alsow cosl too .
While neuclear fuerl which the world seek today through explod the uranium
atom ( 233) the therum atom (239) and neuclear mxied through ruemlear
mixing , These energy have effect on environment and humanity speciaty if
they are used in militery purposes .
For all theses scientests srarch for resources of renewing enery through
researches studies , using environment technology reduce traditional energy,
they found that the resources of ernewing energy ( sun power , wind power ,
mechanical power of water,chamical power of water , underland power
,aidragyn power , natural power, laser power )
The presnet study try to make suggestd plan to develop the resources of
traditional and contionuos energy and use them in arabic enviroment . The
researcher found there is no plan for developing energy resources , he tried
through this study to present infront of researchers and discuss the geogrphy
teachers role who have the ability and srarch in natural resouces specially
the resources of engery , through planning and developing these resources
reaching to ( sustainable development ) which appear as a new concept for
development and planning after 1997 by ( UN programm ) in developing the
resources of humanity and nature and the right present and future
generation far away from ( poverty + ignorance + disease ) specially in arabic
enviroment
As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreThe Current research aims to identify ( the effect of Carin model in the achievement of the first intermediate Grade Students and their Reflective Thinking in physics Subject ) the researcher selected the experimental design with a partial adjust , The research sample consisted of ( 47 ) Students with ( 23 ) Students in the experimental group and ( 24 ) Students in the control group , The two groups rewarded in the variables chronological age in months , Reflective Thinking and the degrees in physics in the first course. The researcher coined the purposes of behavioral which belong to chapter fifth, sixth, and seventh of physics books scheduled of the school year ( 2015-2016 ) and prepared appropriate lesson plans for the two experimenta
... Show Morethe digital public relations aim at make the workers getting the necessary information about the governmental institutions where they work and the enveronment surrounding them. it also tries to let the workers get the special knowlege of tthe publich relations and their jobs like the works of planning , arranging the active communication and executive skills needed in their writing , editing , special art skills for designing , production and technological skills to deal with the computer.
the problem of the research includes some questions as :
1- what are the uses achieved by degetal public relations workers at Iraqi universities (Baghdad, Mustansiriya, and Iraqi)
2- what are the tools used to apply digital public relations
This research examines the phonological adaptation of pure vowels in English loanwords in Iraqi Arabic (IA). Unlike previous small-scale studies, the present study collected 346 loanwords through document review and self-observation, and then analyzed them using quantitative content analysis to identify the patterns of pure vowel adaptation involved in incorporating English loanwords into IA. The content analysis findings showed that most pure vowel adaptations in English loanwords in IA follow systematic patterns and may thus be attributed to specific characteristics of both L1 and L2 phonological systems. Specifically, the findings suggest that the IA output forms typically preserve the features of the input pure vowel to the maxi
... Show MoreThe education, especially higher education, is an essentially factor in the progress of any society, if we consider the higher education, represents the top of the education`s pyramid which take part in developing the human resources and provide the human staff to raise the productive efficiency, and improve the social , economic level
In order to face the increasing importance of higher education, great capabilities and expenditures must be available in a continous way, such expe
... Show MoreThe study aims at explaining the extent to which the principles of educational management reform contribute to Ibn Ashour in achieving educational management reform and the extent to which the pillars of the Kingdom's Vision 2030 in the field of Education in achieving the educational management reform. The study also aims to provide a future vision of what the educational administrative reform and its results should be in the Kingdom during the next ten years. To achieve the goals of the study, the researcher followed two approaches: on the theoretical side, he relied on applying the content analysis method. As for the applied side, the researcher adopted the Delphi method by two questionnaires to ask (36) participants from the experts a
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreThis current study aimed to explore the mediation effects of mother's mental health symptoms between marital adjustment and child development aspects. (666) participants of mothers and their children were the sample of the study. The researchers used the marital adjustment scale prepared by Manson, Morse, Lerner, Arthur, as well as, a package of tests for some aspects of growth Kindergarten children prepared by Kenawi and Mohamed (1999). In addition, theyemployed a list of modified symptoms (Symptom Checklist-90- Revised (SCL) -90-, prepared by Derogatis, Lipman and Lipogun & Cov (1976), The results of the current study showed there is a statistically significant relationship between marital adjustment and the symptoms of mental diso
... Show MoreResearch summary
Islam protects the environment and civilians in peace and war, and in international humanitarian law protection of the environment and civilians in international conflicts only. As for wars and internal conflicts, it is not within the jurisdiction of international humanitarian law. In Islamic law, the principles of protecting the environment and civilians are fixed in all wars and conflicts, whether internal or external, local. or international.
Islam laid down moral principles in war, including:
- Preserving the environment and avoiding corruption in the land by burning trees and killing animals unnecessarily.
- Not to be exposed to non-combatants, including women, boys, the elderly, the disa
... Show More