The study hypothesize that the majority of Arab countries show a poor agricultural economic efficiency which resulted in a weak productive capacity of wheat in the face of the demand, which in turn led to the fluctuation of the rate of self-sufficiency and thus increase the size of the food gap. The study aims at estimating and analyzing the food security indicators for their importance in shaping the Arabic agricultural policy, which aims to achieve food security through domestic production and reduce the import of food to less possible extent. Some of the most important results reached by the study were that the increase in the amount of consumption of wheat in the countries of the sample did not come only from the increase in production but also from large quantity of imported wheat during the study period. The study also found a significant food gap in the Arab countries, including Iraq, in most of the major food commodities including wheat, a fact that is a result of deficit in the agricultural sector to meet the local needs of these goods. A number of recommendations were suggested in the study including i.e following successful agricultural policies that encourage investors and agricultural producers in the Arab countries, whether they are active in the private sector or mixed private and public sectors .This can be accomplished by providing inputs to agricultural production inputs including fertilizers, pesticides and seeds in addition to modern technology at affordable prices, while expanding the areas cultivated with wheat crops in order to counter the domestic inability of production of the crop in question in quantities sufficient to meet the growing domestic demand for a crop that is a major commodity both locally and the Arab country level. The study also recommends the support, development and implementation of the results of agricultural research in the Arab homeland countries and encourages common agricultural research between the Arab countries
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show Moreيتداخل الأمن مع التنمية تداخلاً بناء وتداخلاً هداماً؛ فالأمن والتنمية مطلبان أساسيان متلازمان في علاقة جدلية تحكم أي علاقة استراتيجية للأمن القومي في أية دولة، ولا يمكن الحديث عن استراتيجية للأمن القومي دونما إرساء دعائم التنمية الاقتصادية والاجتماعية؛ باعتبارها صمام أمان وضمان استراتيجي للعملية الأمنية في بعدها الشامل ، كما إن غياب أو ضعف البنية الأمنية ينعكس بشكل مباشر على التنمية ويهدد بنسف أية مقاربة
... Show MoreAbstract:
Rabi’a tribe lived on the land of Euphrates since the first century of the
Christ. Then that land becomes her homeland. The Persians tried many times
to drive her away from that land, but with out result.
In the course of time Rabi’a become more knowledgeable of Persia.
This tribe proved her love and sanctification to the land of Euphrates, in the
battle of Dhyqar.
Rabi’a converted to Islam quickly and helped the Muslims to conquer
Iraq with a big number of fighters in many battles like al- Qadisyyah. That
influenced the anger of Mudriat Arab tribes who were their old enemies.
Mudriat tribes did their efforts to reduce the importance of Rabi’a because of
some its branches were among of t
Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette
... Show MoreMonetary sterilization policies are one of the modern trends of monetary policy in rentier countries, specifically to confront the positive shocks in foreign assets flowing into the national economy and the impact of these shocks on monetary and real variables. And that the Central Bank contains these emergency increases in foreign exchange with the aim of avoiding the impact of this increase on the official local currency through its three main monetary tools, which are the rediscount rate, the legal reserve, and open market operations. As well as the relationship between the central bank and the objective of external balance, which is reflected in the balance of payments balance, the central bank resorts to managing the exchange rate
... Show MoreIn this work, the occurrence conditions of both local Bifurcation and persistence were studied, Saddle-node bifurcation appears near fourth point, near the first point, the second point and the third point a transcritical bifurcation occurred but no pitchfork bifurcation happened near any of the four equilibrium points. In addition to study conditions for Hopf-bifurcation near positive stable point that is the fourth point. Besides discuss persistence occurrence as globally property of the food chain of three species include prey, first predator and top predator with impact of toxin in all species and harvesting effect on the predator’s only. Numerical results for the set of hypothe
Unconfined compressive strength (UCS) of rock is the most critical geomechanical property widely used as input parameters for designing fractures, analyzing wellbore stability, drilling programming and carrying out various petroleum engineering projects. The USC regulates rock deformation by measuring its strength and load-bearing capacity. The determination of UCS in the laboratory is a time-consuming and costly process. The current study aims to develop empirical equations to predict UCS using regression analysis by JMP software for the Khasib Formation in the Buzurgan oil fields, in southeastern Iraq using well-log data. The proposed equation accuracy was tested using the coefficient of determination (R²), the average absolute
... Show MoreThe present study is an attempt to throw light on the nature of the US policy regarding the Middle East region as portrayed by AI-Sabah, Al-Mashriq and Tariq Al-Shaab papers over a period of three months from 1st of July to 30th of September 2013.
In writing this study, a number of goals have been set by the researcher. These goals may include but in no way limited to the nature of the US image as carried by the above three papers, the nature of the topics tackled by them and the nature of the Arab countries which received more and extensive coverage than others.
A qualitative research approach is proposed for the study. This approach has allowed the researcher to arrive at definite answers for the possible questions rais
... Show More