The study hypothesize that the majority of Arab countries show a poor agricultural economic efficiency which resulted in a weak productive capacity of wheat in the face of the demand, which in turn led to the fluctuation of the rate of self-sufficiency and thus increase the size of the food gap. The study aims at estimating and analyzing the food security indicators for their importance in shaping the Arabic agricultural policy, which aims to achieve food security through domestic production and reduce the import of food to less possible extent. Some of the most important results reached by the study were that the increase in the amount of consumption of wheat in the countries of the sample did not come only from the increase in production but also from large quantity of imported wheat during the study period. The study also found a significant food gap in the Arab countries, including Iraq, in most of the major food commodities including wheat, a fact that is a result of deficit in the agricultural sector to meet the local needs of these goods. A number of recommendations were suggested in the study including i.e following successful agricultural policies that encourage investors and agricultural producers in the Arab countries, whether they are active in the private sector or mixed private and public sectors .This can be accomplished by providing inputs to agricultural production inputs including fertilizers, pesticides and seeds in addition to modern technology at affordable prices, while expanding the areas cultivated with wheat crops in order to counter the domestic inability of production of the crop in question in quantities sufficient to meet the growing domestic demand for a crop that is a major commodity both locally and the Arab country level. The study also recommends the support, development and implementation of the results of agricultural research in the Arab homeland countries and encourages common agricultural research between the Arab countries
Abstract The success of the system of government in any country needs to have a handle on the amount of power efficiency , capacity , capability and wisdom, Iraq has gone through since its inception through several stages of time, namely: The first stage: which ran from August 23, 1921 until July 14, 1958 and was ruling monarchy (rule of the royal family) and punishing power of political elites both of them and works access to power without taking into consideration the laws and principles of the Constitution, and as a result of the inability of civilian powers and political parties access to power to grant that army officers regulatory and disciplinary specifications as well as possessing arms and overthrow the rule of the minority coup
... Show MoreABSTRACT Background: Cortical bone thickness is important for the stability of mini implants. Placing mini implants in sites of favorable cortical bone thickness would guarantee better initial stability and long-term success. The aim of this study was to investigate gender, side and jaw differences of the buccal cortical bone thickness as a guide for orthodontic mini screw placement. Materials and Methods: The sample was selected from the patients attending the Specialized Health Center in Al-Sadr City / 3D department. Thirty patients (15 males and 15 females) were selected and cone beam computerized tomographic images were done. Then the buccal cortical bone thickness was measured at thirteen inter radicular sites in the maxilla and mandib
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreAccording to grammarians In ( نإ) and Itha (اذإ) are conditionals and sometimes they may be used interchangeably. However, when they are mentioned in the Holy Qur’an, they have their own specific use. This paper attempts to investigate their meanings in the source language as well as investigate their translations and find out any differences or similarities. The translations that are adopted in this research are as follows: Pickthall, Al-Hilali & Khan, and Shakir.
Most of drinking water consuming all over the world has been treated at the water treatment plant (WTP) where raw water is abstracted from reservoirs and rivers. The turbidity removal efficiency is very important to supply safe drinking water. This study is focusing on the use of multiple linear regression (MLR) and artificial neural network (ANN) models to predict the turbidity removal efficiency of Al-Wahda WTP in Baghdad city. The measured physico-chemical parameters were used to determine their effect on turbidity removal efficiency in various processes. The suitable formulation of the ANN model is examined throughout many preparations, trials, and steps of evaluation. The predict
Every researcher must say that the world in continually progress toward the best and that
the Arab and Islamic civilization had produced much of systems and virtuous educational
practices which raised from Islamic heritage. This nation was not isolated from external
world, but it was made a clear active for promote the banner of other nations which entered
under her influence to promote Islamic banner and Muslims. Consequently also Muslims are
affected and influenced, this resulted a clear impact in the civilization and educational
ideology especially in the contemporary teaching methods.
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.