Agricultural chemicals on a large scale of use throughout the world, and there are many studies about these chemicals and its disadvantages, but most of them were limited to its impact on mammals such as rodents in determine. This study was designed to determine the impact of these chemicals on DNA damage for E. coli bacteria from Iraq. The DNA is similar in terms of structure and function in all living organisms with a different in number and sequence of the nitrogenous bases among living organisms. This study showed that snails and slugs killer material Metaldehyde are strongly bind with the DNA extracted from bacteria, and herbicides Glyphosate also showed that clearly when treated with DNA extracted from bacteria, as well as with the plasmid DNA.
Constructing The Psychological Tranquility Scale of the University of Baghdad Students
The research aimed to :
- Constructing the Psychological Tranquility Scale of the University of Baghdad Students.
- Appointing the psychological content standard for the accepting Answer of student about the scale.
The research Sample was (414) boy and girl from Baghdad University Students for the Studying year (2008-2009), So the Scale of the Psychological Tranquility Scale was bilt on them in good psychometric properties from truth Factor analyzing which was its super saturation was reached to (50) item from its items a value more than the super sutution norm (0,30) for kaizer, also the firm value was Relaibility for the scale by the way
The research seeks to identify the factors affecting the monopoly and the possibility of measuring the phenomenon of economic ( monopolistic profit) accounted for and that the importance of research topic arising from the transformation of the majority of developing countries to the market economy, which represents the image of the capitalist economy, which is a monopoly, a stages that economy in its various forms, whether Market Worldwide sales monopoly or monopoly, which generates absolute monopolistic profits, which more or less affect on the overall economy of those countries than they should study the phenomenon of monopoly and its impact on the economies of those countries that still love to find her site reinforces its pos
... Show MoreIn the last decades of the twentieth century, ideas emerged that were increasingly being floated, stating that the planet is suffering from a population explosion, depletion of resources, and environmental problems that require action to be addressed. Although these problems in practice need scientific solutions, the problem is that these solutions collide with ideologies. Here the green political thought emerges, based on the criticism of many ideological axioms. The owners of green thinking agree that most environmental damage is due to the humanist doctrine. It criticizes modernity accompanied by a scientific revolution, where this criticism centered around (the rationality of the scientific and technological mind), here the green pol
... Show MoreThe Arabic pronouns received a lot of attention from the ancient Arab grammarians, so they explained their origins, the different forms of their structure, and the aspects of the Arabs’ use of them, and explained the aspects and reasons for these uses, with what they had of linguistic insight, which guided them to clarify the truth of these pronouns.
And recently, this research seeks new knowledge of the development of the structure of the nominative pronouns (he), (she), (them), (taa), and (waw) between dialects and towards classical Arabic, by analyzing the structure of these pronouns into their components. Its linguistic formulas are traced from the ancient Arabic texts, and by ancient I mean the texts of the era of linguistic ci
The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreIn this paper, a new approach was suggested to the method of Gauss Seidel through the controlling of equations installation before the beginning of the method in the traditional way. New structure of equations occur after the diagnosis of the variable that causes the fluctuation and the slow extract of the results, then eradicating this variable. This procedure leads to a higher accuracy and less number of steps than the old method. By using the this proposed method, there will be a possibility of solving many of divergent values equations which cannot be solved by the old style.
Abstract
The intellectual capital an important variable in the equation of the success of seeking economic units to achieve a competitive advantage, since it is a real capital for economic unity it constitutes a strategic importance as the main source to achieve high profitability in the economic unit and highlights the importance of showing intellectual capital components of the main Represent of human capital and structural capital and relational capital, through effective and the prominent role played by intellectual capital within the economic unity in order to achieve a sustainable competitive advantage contribute to attracting investors with longer investment decision of the most important and difficult decisions ta
... Show MoreThis research study focuses on fundamental questions. It deals with the content of the critical reviews through which the most important sources that undermine the renaissance of the Islamic human society can be concluded. It is the vague fetishization of the sacred between religion, politics, and ideas, which members of society live in and which raised the dust of closed-minded fanaticism that led to the return of deviant extremism. It is oppression, violence, and domination, all of which are professional tools in the manufacture of the ideology of extremism in all its forms. Here, the idea matured in giving a human, intellectual and philosophical overview that mixed the required drawing in the formulation of scientific cont
... Show More