Preferred Language
Articles
/
mBY4vYsBVTCNdQwCstlT
The Water Footprint and Virtual Water and Their Effect on Food Security in Iraq
...Show More Authors
Abstract<p>The study aimed to explaining the concepts of water footprint and virtual water and how these two concepts could use to achieve water savings at the local level to meet the water supply deficit in Iraq, which is expected to increase in the coming years and influence of that on food security in Iraq by using these concepts when drawing production, irrigated and import plans in Iraq. The study aimed to studying the water footprint and virtual water and their impact on the foreign trade for wheat and rice crops during the period 2000-2022 and estimating the most important indicators of virtual water and the water footprint of the study crops due to the importance of these criteria in determining the amount of increase or decrease in the area of the studied crops, according to the foreign trade policy. This study was concluded that the average total water footprint of the wheat and rice crops during the study period is (20.27,13.89) billion m3 respectively, and the average percentage of dependence on external water resources for both crops are (20.49%,67.98%) respectively, and the average percentage of self-sufficiency in water resources are (79.51%,32.01%) respectively, and the average unit productivity of irrigation water for both crops is (0.19,0.10) kg/m3 respectively during 2000-2022.The average for the water needs of wheat and rice crops during the study period were (6.04,10.19) m3/kg respectively, the average amounts of water used in local production for both crops are (14.23,4.01) billion m3 respectively, the average amounts of virtual water imported for both crops are (6.19,10.03) billion m3 respectively, and the average value of the imported virtual water for both crops is (382,529) thousand dollars during the period 2000-2022. The study recommended to taking in account these concepts in plans of production and distributing irrigation water.</p>
Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Open Agriculture
Interannual variations of normalized difference vegetation index and potential evapotranspiration and their relationship in the Baghdad area
...Show More Authors
Abstract<p>A monthly correlation between urban vegetation growth and potential evapotranspiration (PET) is needed for better knowledge of controlling water resources and organized irrigation processes. This study aims to explore their relationship within an urban area like Baghdad, using a linear regression model to derive a best-fit line drawn in a scatterplot on a monthly time scale. Based on two different monthly data sources: weather variables (e.g., air temperature, solar radiation, and relative humidity) and Sentinel-2 satellite imagery of 2 years, 2018 and 2021, this study presented the interannual variations of PET and normalized difference vegetation index (NDVI). The choice of these ye</p> ... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The relationship between organizational culture and administrative creativity among colleges' deans and their assistants in Baghdad University
...Show More Authors

Generally, the academic facilities necessitate specific criteria to be under the regional standards such as creative leaders, and a positive climates that induce to create an organizational culture within the academic institution. Consequently, these variables promote to improve the educational and administrative performance pursuing to achieve the general objectives. Thus, the current research aims to explore the level of privileged organizational culture among Baghdad University Colleges, explore the administrative creativity of deans and their assistants in addition to identify the relationship between them. The researchers prepared two instruments which were distributed among (70) individual of the targeted sample to collect the requ

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
The Interactive Relationship between the Formation Elements and their Implications in the Structure of the Television Image
...Show More Authors

The image of television dominates the cognitive and artistic motivations. It is the formulation of ideas and visions along with its documentary ability. It is the main element in television work as it is a story that is narrated in pictures. Therefore, attention to image building is a major point of gravity in the work structure as a whole. On the image is the element carrying all aesthetic and expressive values of news and information directly to the hints that work to stimulate and stir the imagination of the recipient to evoke mental images added to the visual images to deepen the meanings.
All visual arts carry elements and components that follow in a particular pattern to give special meanings and specific connotations. However,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Population Therapeutics And Clinical Pharmacology
Kinetic and thermodynamic study of adsorption of an industrial food dye using Iraqi clay
...Show More Authors

View Publication Preview PDF
Clarivate Crossref
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the external auditor in assessing the security of information technology systems in light of (ISO/IEC 27001): (Applied research on a sample of private banks)
...Show More Authors

This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p

... Show More
View Publication Preview PDF