Research Hypothesis from the fact that kicks off the effect that agricultural production in Iraq plays an important role in overcoming the food problem and achieving food security, but he became far far away from the provision of sufficient quantities of food products and then securing the Iraqi consumer food basket by the challenges faced by the agricultural sector.
To prove the hypothesis research in its structure in three axes came, the first axis eating historical significance to the subject of food over time periods as well as to clarify the concept of food security, and the second axis touched on the most important challenges facing the agricultural sector in Iraq and prevent the achievement of food requirements for members of the community adequately, and Axis the third said the most important effects that the food problem in Iraq.
It emerged from research that the agricultural sector in Iraq suffers from the problems of big challenges and that the survival of the case as it stands marks one of the most important gaps facing agricultural policy in Iraq, which means the presence of food problem and ultimately have a negative impact on consumer food basket, and represented the most important challenges of inadequate production plant and domestic animal, and weak competitiveness of food commodities, with limited acreage, and the stability of the proportion of spending from the general budget, along with the problem of water and declining volume of water inventories, has left these challenges are many traces of the most important of inflation and rising prices with low agricultural export volume and thus deteriorating develop commercial features, as well as the disruption of social support structure, was reached to the importance of interest in investing in the agricultural sector and improve its capabilities productivity, while improving the competitiveness of food commodities through the transition to a competitive advantage based on technology and scientific research in order to achieve quality and low cost, with a need for attention vocabulary ration card through the improvement of vocabulary and distribution guarantees for citizens by constantly contribute to reducing the incidence of poverty in the country.
Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
Abstract* Backgrounds The retention of the maxillary complete denture may be influenced by adequate recording in the patient’s mouth, marking, and carving of the post-dam on the maxillary cast. Failure to do so may lead to loss of retention. Successful denture construction with patient’s comfort could be achieved by effective methods of recording, marking, and carving of the post-dam. The aim of the study was to assess Iraqi dentists in their knowledge and application of the post-dam in maxillary complete dentures. Methods Questionnaires were distributed randomly through online Google Forms and 118 Iraqi dentists with different academic degree participated in the study. A multinomial logistic regression model was also used to ass
... Show MoreAdaptive responses in larval behavior may be of two kinds: Taxis: This involves a change in direction relative to source of a stimulus. Kinesis: Kinesis has no directional component, but involves change in the rate of performance in response to a stimulus. Drosophila larvae exhibited flexible behavioral responses associated with food acquisition and selection for different environmental conditions. In this investigation, we are concerned explosively with kinetic responses to food viability. Third instar larvae were subjected to test for thirty minutes in each of the following conditions i) in distilled water, ii) in Ringer's solution, iii) in glucose solution and on live yeast suspension. In each case the larva was in a thin layer of solu
... Show MoreFive levels of Zn-EDTA fertilizer and foliar application of boron were used to study the local rice response through studying of some vegetative and reproductive growth characters, by conducting two field experiments at Kanipanka Agricultural Research Station during the summer season of 2004 by using RCBD with three replications. Significant differences were found in studied characters, there were increase in the number of days from seeding to 50% flowering (94.330-96.233) days, from 50% flowering to physiological maturity (37.50-38.28) days, plant height (82.50-91.423) cm and LAI (5.441-7.525). Reproductive characters such as number of grains panicle-1 (74.11-85.88), number of panicles m-2 (321.00-426.083), biological yield (8166.166-11082
... Show MoreThe influence of silver doped n-type polycrystalline CdTe film with thickness of 200 nm and rate deposition of 0.3 nm.s -1 prepared under high vacuum using thermal co-evaporation technique on its some structural and electrical properties was reported. The X- ray analysis showed that all samples are polycrystalline and have the cubic zinc blend structure with preferential orientation in the [111] direction. Films doping with impurity percentages (2, 3, and 4) %Ag lead to a significant increase in the carrier concentration, so it is found to change from 23.493 108 cm -3 to 59.297 108 cm -3 for pure and doped CdTe thin films with 4%Ag respectively. But films doping with impurity percentages above lead to a significant decrease in the electrica
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.
A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.
Being unsatisfied with the job was as