Preferred Language
Articles
/
jeasiq-935
The Economic Feasibility of the beekeeping project Using the method of mobile promiscuous
...Show More Authors

               An update of our research is the first to develop and reform the agricultural sector . and promoting production and productivity of this sector multi-sources , which is the management and beekeeping one source . Been applied to the style of beekeeping mobile promiscuous includes twentieth cell in the Iraqe project of mussiab . in which there exist a variety of crops and trees .

Experiment had proved successful and led to raise the level of npoduction of single Dell of the honey to 49 kg over the previous year and surpassed the average production percell in the province of Babylon , which the amount of 13.945 kg , another quantity of honey has been abtained by feeding different groups of bees . as well as propols and royal jelly and parcels Rate of return of about 9.58 perdinar and return on invested capital of about 8.52 . in addition to the design of aprivate vechicle to help the farmer on the process of movement , are promiscuous mobile at all time and is independent of other establiched .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 09 2019
Journal Name
Journal Of The College Of Education For Women
Mental Strain and its Relationship with the Attitude towards the Immigration of the University Students
...Show More Authors

the appearance and increasing of the young immigration within 2015, the researcher intuition as a mother and part of the society, and the role of the psychological attitude in enabling the individual to make decision, in the light of all the above come up the need for studying this problem.
The study aims at finding out:
1. The mental strain of the study sample.
2. The differences in mental strain of the study sample according to the gender, specification, the university, the study (private, not private), and if they have immigrated friends or relatives out of the Iraq.
3. The study sample attitudes towards immigration.
4. The study sample levels of attitudes towards immigration.
5. The differences in the sample attitud

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 12 2022
Journal Name
International Journal Of Health Sciences
Employing documentaries in the Iraqi satellite channel to reveal the crimes of the former regime
...Show More Authors

This study is one of the descriptive studies, where the researcher used the survey method, which seeks to provide an accurate and appropriate description of the main and sub-categories of the content of the research for television documentaries on the Iraqi satellite channel, relying on the research questions and objectives to analyze the content of the documentaries according to the approach referred to above. The objectives of the research were summarized to identify the function of the documentary programs in Al-Iraqiya channel to detect the crimes of the former regime, to know the frameworks highlighted by the documentary programs in Al-Iraqiya channel to reveal the crimes of the former regime, to identify the extent of the circ

... Show More
View Publication
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The role of governors and Arab workers in helping the needy and the poor in the eras Rashidin and Umayyad
...Show More Authors

The research deals with financial and supplies support from the rulers and governors of the
Arab cities and Islamic regions to the poor of common people and the poor of their own . The
Islamic Arab community was characterized , since the prophet's era , with great humanistic
features that formed the cultural characteristic which organized individual's economic life .
The prophet , senior Muslims and the rich cared a lot about this side . There was a large
variation in the degrees of wealth and poverty in the Muslim Arab community as a heritage
from the pve – Islamic society where there is no concern about helping the needy and poor .
Thus , the research sheds light on the different forms of help offered by rulers a

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Analyzing the content of the two science books (the two chemistry units) for the intermediate stage according to environmental problems
...Show More Authors

    The main goal of the current research is to know -Environmental problems included in the content of the two science books (chemistry units) for intermediate stage

A list of environmental problems had been prepared  and  consisting of (8) main areas which are (air and atmosphere pollution, water pollution, soil pollution, energy, disturbance of biodiversity and environmental balance, waste management, food and medicinal pollution, investment of mineral wealth). Of which (60) sub-problems,  at that time the researcher analyzed the two science books (two chemistry units) for the intermediate stage of the academic year (2020-2021) in light of the list that was prepared, and the validity and consisten

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
Anbar Journal Of Agricultural Sciences
THE GENETIC DIAGNOSIS OF THE BACTERIA ISOLATED FROM THE AGRICULTURAL SOIL SUSTAINED FARMS BY THE POLYMERASE CHAIN REACTION TECHNIQUE QPCR
...Show More Authors

The measurements and tests of the samples conducted in the laboratories of the College of Agriculture included isolating bio-fertilizers and testing the efficiency of isolates that fix atmospheric nitrogen and solubilize phosphorous compounds. Bacteria were isolated and identified from the rhizosphere soils of different plants collected from various agricultural areas. A total of 74 bacterial isolates were obtained based on the phenotypic characteristics of the developing colonies, as well as biochemical and microscopic traits. The results of isolation and identification showed that among the 74 bacterial isolates, there were 15 isolates of A. chroococcum, 13 of Az. lipoferum, 13 of B. megaterium, 10 of P. putida, 10 of Actinomycetes, and n

... Show More
View Publication
Scopus (11)
Scopus Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Reduced Complexity SLM Method for PAPR Reduction
...Show More Authors

In this paper, the computational complexity will be reduced using a revised version of the selected mapping (SLM) algorithm. Where a partial SLM is achieved to reduce the mathematical operations around 50%. Although the peak to average power ratio (PAPR) reduction gain has been slightly degraded, the dramatic reduction in the computational complexity is an outshining achievement. Matlab simulation is used to evaluate the results, where the PAPR result shows the capability of the proposed method.  

 

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 03 2022
Journal Name
Tikrit Journal Of Pure Science
A Pixel Based Method for Image Compression
...Show More Authors

The basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
New Iterative Method for Solving Nonlinear Equations
...Show More Authors

The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.

View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More