Preferred Language
Articles
/
jeasiq-113
The use of water resources in light of the challenges of water security in Iraq
...Show More Authors

Iraq suffers from lack of water resources supply because the headwaters of the rivers located outside its borders and the influence of upstream countries on the quantities of flowing water, in addition to the increase of pressure on available water as a result of population increase and not adopting the principle of rationalization where misuse and wastage and lack of strategic vision to treat and manage water use in accordance with the economic implications fall.  This is reflected fallout on water security and subsequently on national and food security, while the issue of using water resources is development top priority in different countries in the world because of the importance of water effect on the security of individuals and society in light of population increase and the fluctuation of water resources and lack of incoming water in addition to the increase of salinity and the decrease of water levels and its fluctuation and its reflect on the agricultural sector and its deterioration, as well as the need of industry of all types to water in light of the expansion of industrial activities that Iraq might experience,  in addition to the importance of using water in power plants , water law prices is considered one of the factors that led to disruption of water security in Iraq where waste and misuse and loosing big quantities of water in terms of not applying economic implications for water use and hence the importance of adopting a comprehensive strategic plan to determine the factors of water deficit problem and taking in consideration the economic vision and the international experience in managing supply and demand on water that can be applied in Iraq, this is why this study focused on the economic implications of integrated water management in accordance to a strategic perspective to limit the crisis of water in Iraq.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
The Asian Efl Journal
The EFL Students' Academic Buoyancy in Reading and Listening Skills
...Show More Authors

This research aims at identifying the Iraqi EFL students' academic buoyancy in reading and listening skills and then finding out the difference between the two skills; Furthermore, finding out the five predictors differences of each of the two scales. Two academic buoyancy scales used to collect data. After achieving the scales' psychometric characteristics, they are submitted to the study sample. The sample of (100) female students selected according to the stratified random method from the second class at the Department of English\ College of Education for Women\ University of Baghdad. The results show that the students have academic reading buoyancy and have not academic listening buoyancy; the difference between the two abilities shows

... Show More
View Publication Preview PDF
Scopus
Publication Date
Sat Sep 30 2023
Journal Name
Lark
ADJECTIVES WITH THE SUFFIX -OVATE - / - EVAT IN MODREN RUSSIAN LANGUAGE
...Show More Authors

يكشف هذا المقال عن مشكلة الصفات ذات المكون الكمي والتي تعتبر واحدة من اقوى الموارد المكونة للكلمات التعبيرية والتقويمية و يتم تحليل التركيبات الدلالية ذات الاوجه المتعددة التي تنشا من عملية توظيف الصفات المشتقة بمساعدة اللواحق والتي تدل على الاتجاه العام للغات السلافية وذلك لتطوير الدلالات العاطفية والتقييمية في الكلمات ذات معنى الميزة او الخاصية يتم تقديم تعريف انماط تكوين المعاني الضمنية في دلالات

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
The Quest for Stability in Willa Cathar’s Novle My Antonia
...Show More Authors

    Willa Cather (1873-1947) sought to capture the gradation of human emotion through carefully selected descriptive and narrative touches and firmly controlled management of dramatic scenes, situations, dialogue, and point of view. Cather’s novels and stories drew increasingly upon her personal experiences and memories.

    The old settlement of Virginia and the new lands of Nebraska formed the bedding ground for Willa Cather’s talents; so did the layers of memory she found across the North American continent, from New Mexico to Canada. She saw the full-blooded European immigrants, Czechs and Swedes, plowing the unbroken land, on the way up from peasants to proprietors.

  &nbsp

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 15 2019
Journal Name
Arab World English Journal For Translation And Literary Studies
The Unavoidable Suffering in Selected Literary Texts: Poems and Novels
...Show More Authors

View Publication
Crossref
Publication Date
Wed Jan 19 2022
Journal Name
International Journal Of Inventions In Engineering & Science Technology
Biodiversity in the Northern Region using GIS and Remote Sensing
...Show More Authors

Biodiversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity (by developmental factors) environmental factors and environmental factors environmental factors and environmental factors and environmental factors Correlation between biology and the succession of geological and historical factors of living organisms and geological and historical factors to the site and what It is surrounded by natural and tourist attractions and the pursuit of scientific methods in order to advance the studies of biological diversity in the region .

Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Statistical Model for Predicting the Optimum Gypsum Content in Concrete
...Show More Authors

The problem of internal sulfate attack in concrete is widespread in Iraq and neighboring countries.This is because of the high sulfate content usually present in sand and gravel used in it. In the present study the total effective sulfate in concrete was used to calculate the optimum SO3 content. Regression models were developed based on linear regression analysis to predict the optimum SO3 content usually referred as (O.G.C) in concrete. The data is separated to 155 for the development of the models and 37 for checking the models. Eight models were built for 28-days age. Then a late age (greater than 28-days) model was developed based on the predicted optimum SO3 content of 28-days and late age. Eight developed models were built for all

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 24 2022
Journal Name
Arab World English Journal
Conflict in Atwood’s The Handmaid’s Tale: A Critical Discourse Approach
...Show More Authors

Conflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Wed Sep 13 2023
Journal Name
Aip Conference Proceedings
Results for the (b,t)-blocking sets in PG(2,8)
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Sep 17 2025
Journal Name
University Of Kirkuk Journal For Administrative And Economic Science
Anova For Fuzzy Data With Practical in The Medical Field
...Show More Authors

This research study Blur groups (Fuzzy Sets) which is the perception of the most modern in the application in various practical and theoretical areas and in various fields of life, was addressed to the fuzzy random variable whose value is not real, but the numbers Millbh because it expresses the mysterious phenomena or uncertain with measurements are not assertive. Fuzzy data were presented for binocular test and analysis of variance method of random Fuzzy variables , where this method depends on a number of assumptions, which is a problem that prevents the use of this method in the case of non-realized.

View Publication Preview PDF