The study aimed to explaining the concepts of water footprint and virtual water and how these two concepts could use to achieve water savings at the local level to meet the water supply deficit in Iraq, which is expected to increase in the coming years and influence of that on food security in Iraq by using these concepts when drawing production, irrigated and import plans in Iraq. The study aimed to studying the water footprint and virtual water and their impact on the foreign trade for wheat and rice crops during the period 2000-2022 and estimating the most important indicators of virtual water and the water footprint of the study crops due to the importance of these criteria in determining the amount of increase or decrease in the area of the studied crops, according to the foreign trade policy. This study was concluded that the average total water footprint of the wheat and rice crops during the study period is (20.27,13.89) billion m3 respectively, and the average percentage of dependence on external water resources for both crops are (20.49%,67.98%) respectively, and the average percentage of self-sufficiency in water resources are (79.51%,32.01%) respectively, and the average unit productivity of irrigation water for both crops is (0.19,0.10) kg/m3 respectively during 2000-2022.The average for the water needs of wheat and rice crops during the study period were (6.04,10.19) m3/kg respectively, the average amounts of water used in local production for both crops are (14.23,4.01) billion m3 respectively, the average amounts of virtual water imported for both crops are (6.19,10.03) billion m3 respectively, and the average value of the imported virtual water for both crops is (382,529) thousand dollars during the period 2000-2022. The study recommended to taking in account these concepts in plans of production and distributing irrigation water.
This research examines the issue of Internet banking services and their impact on customer's perceived value to know the potential of Iraqi commercial Banks to provide Internet banking services as well as determine the customer's level of perception of the value of such services. The research aims to demonstrate the effect that Internet banking services have on the customer's perceived value and to find how online banking services can be used to add value that the customer perceive. The main findings were that research sample banks don't have a sophisticated network of electronic Windows through which banking services are provided to allow customers to manage their accounts, and perform various operational operations through the
... Show MoreThe study aimed to identify the awareness degree of teacher students in the department of Arabic language and their supervisors at Al-aqsa University for their future roles in the age of knowledge. To achieve this objective, descriptive- analytical approach was used. The instruments of this study were two questionnaires: first one consist of (20) item for teacher students, and the second consist of (27) item for educational supervisors which covered three roles: professional, technological, and humanitarian. The sample was (120) student selected randomly, and (39) supervisors of Arabic language. The result revealed that the mean of degree awareness of teacher students and their supervisors of future role are (3.857), (3.472) respectively
... Show MoreFive heavy metals, namely Cd, Cu, Fe, Mn, and Pb in the surface water and through the water column were studied at 10 selected stations in the Razzazah lake and Karbala drainage canal for the period between November 1990 to October 1991*. pH and total hardness were also measured. Lead was found to be the highest in concentration as overall average values, followed by an manganese, iron, copper then cadmium at the surface as well as along the water column. All the studied metals were below or close to the maximum allowed limits of Iraqi standards for inland water. The spatial and seasonal variations were discussed.
Water one of the most important sources Which is no doubt essential for life surviving, water is vital in many sectors of life e.g. ( agriculture, industrial, power and so many things can’t be restricted on the mentioned items, water has become major problem facing the world today. Competition over water resources between nations has made it as a vital commodity and a justification for waging wars against its neighbor’s countries, there are currently 263 rivers that either cross or demarcate international political boundaries. Geographically, Europe has the largest number of international basins (69), followed by Africa (59), Asia (57), North America (40), and South America (38).The absolute numbers of international basins, as well as t
... Show MoreObjectives: The study aims at:
1- Measuring the level of lead in workers’ saliva and blood in the factory.
2- Studying the correlation between the saliva lead level and the infection that caused by microorganisms, isolation and
identification.
3-Studying the influence of high blood lead level on the total white blood cells.
Methodology: This study has been conducted for the period from March 15th, 2010 to May, 20th
, 2010. A total of (60)
saliva and blood samples were collected from workers in batteries industry factory in Baghdad and another (20) samples
were collected as a control group. Lead level had been measured in blood and saliva samples, then microorganisms were
isolated the from the saliva samples.
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show More