Preferred Language
Articles
/
jeasiq-113
The use of water resources in light of the challenges of water security in Iraq
...Show More Authors

Iraq suffers from lack of water resources supply because the headwaters of the rivers located outside its borders and the influence of upstream countries on the quantities of flowing water, in addition to the increase of pressure on available water as a result of population increase and not adopting the principle of rationalization where misuse and wastage and lack of strategic vision to treat and manage water use in accordance with the economic implications fall.  This is reflected fallout on water security and subsequently on national and food security, while the issue of using water resources is development top priority in different countries in the world because of the importance of water effect on the security of individuals and society in light of population increase and the fluctuation of water resources and lack of incoming water in addition to the increase of salinity and the decrease of water levels and its fluctuation and its reflect on the agricultural sector and its deterioration, as well as the need of industry of all types to water in light of the expansion of industrial activities that Iraq might experience,  in addition to the importance of using water in power plants , water law prices is considered one of the factors that led to disruption of water security in Iraq where waste and misuse and loosing big quantities of water in terms of not applying economic implications for water use and hence the importance of adopting a comprehensive strategic plan to determine the factors of water deficit problem and taking in consideration the economic vision and the international experience in managing supply and demand on water that can be applied in Iraq, this is why this study focused on the economic implications of integrated water management in accordance to a strategic perspective to limit the crisis of water in Iraq.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The hydrological regime of the Tigris River in the city of Baghdad
...Show More Authors

Water drainage pattern in the rivers and changed the nature of the renewed feeding areas
in the basin in terms of topographic and geological conditions and climate in addition to the
human role in organizing the process flow within these basins. This study addressed the
development of the Tigris River Hydrological in the city of Baghdad and found that the
annual rate of water drainage in the Tigris River was driven down very significantly,
especially in the past twenty years, and since 1996 up to 2014 record flow rates of less than
the overall rate of discharge of water, a (950 m3 / s ), in addition to the quarterly decrease the
discharge rates, especially since the beginning of the year 2000 and took converge all fo

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
The role of the League of Arab States in the Syrian crisis
...Show More Authors

Abstract The League of Arab States took many procedures against the Syrian political system, like suspended Syria's membership in the League of Arab States and sent a team of Arab observers headed by Dabi to discuss the situation there and issued some decisions and statements that called the Syrian regime to stop the use of violence and repression against the Syrian opposition.Through these steps, the Arab League has tried to help the Syrian parties to resolve the crisis. However, the role of the league in the Syrian crisis was characterized by weakness in general, and lack of seriousness, which contributed in the aggravation of the situation in Syria, and the intervention of major powers in the internal affairs of Syria.

View Publication Preview PDF
Crossref
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
Care of the Holy Quran In the era of the Noble Prophet
...Show More Authors

This is a brief research in which I tried to briefly explain the care that the Holy Qur’an received during the era of the Prophet, may God bless him and grant him peace, from the Prophet, may God bless him and grant him peace, and all of his honorable companions, may God bless him and grant him peace. I made this research in an introduction and two chapters, the first chapter I made it entitled: About the Holy Qur’an, in which I talked about general investigations about the Holy Qur’an, such as the definition of the Holy Qur’an and the difference between it and the hadith Qudsi and the hadith of the Prophet, then I mentioned a part of the virtues of the Holy Qur’an in general and the virtues of some surahs in particular, and th

... Show More
View Publication
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Environment and lifestyle Fish Qattan in the Euphrates River in central Iraq
...Show More Authors

Studied the environment and fish life Qattan in the Euphrates River in central Iraq for the period from September 2002 until 2003 recorded the lowest temperature of the water during the month of January during the month of August ranged salinity ranges between 068

View Publication Preview PDF
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Communications In Computer And Information Science
The Use of Biorthogonal Wavelet, 2D Polynomial and Quadtree to Compress Color Images
...Show More Authors

In this paper, a compression system with high synthetic architect is introduced, it is based on wavelet transform, polynomial representation and quadtree coding. The bio-orthogonal (tap 9/7) wavelet transform is used to decompose the image signal, and 2D polynomial representation is utilized to prune the existing high scale variation of image signal. Quantization with quadtree coding are followed by shift coding are applied to compress the detail band and the residue part of approximation subband. The test results indicate that the introduced system is simple and fast and it leads to better compression gain in comparison with the case of using first order polynomial approximation.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Use of Particle Swarm Algorithm to Solve Queuing Models with Practical Application
...Show More Authors

This paper includes the application of Queuing theory with of Particle swarm algorithm or is called (Intelligence swarm) to solve the problem of The queues and developed for General commission for taxes /branch Karkh center in the service stage of the Department of calculators composed of six  employees , and it was chosen queuing model is a single-service channel  M / M / 1 according to the nature of the circuit work mentioned above and it will be divided according to the letters system for each employee, and  it was composed of data collection times (arrival time , service time, departure time)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Engineering Research And Advanced Technology
The Use of First Order Polynomial with Double Scalar Quantization for Image Compression
...Show More Authors