Preferred Language
Articles
/
mBY4vYsBVTCNdQwCstlT
The Water Footprint and Virtual Water and Their Effect on Food Security in Iraq
...Show More Authors
Abstract<p>The study aimed to explaining the concepts of water footprint and virtual water and how these two concepts could use to achieve water savings at the local level to meet the water supply deficit in Iraq, which is expected to increase in the coming years and influence of that on food security in Iraq by using these concepts when drawing production, irrigated and import plans in Iraq. The study aimed to studying the water footprint and virtual water and their impact on the foreign trade for wheat and rice crops during the period 2000-2022 and estimating the most important indicators of virtual water and the water footprint of the study crops due to the importance of these criteria in determining the amount of increase or decrease in the area of the studied crops, according to the foreign trade policy. This study was concluded that the average total water footprint of the wheat and rice crops during the study period is (20.27,13.89) billion m3 respectively, and the average percentage of dependence on external water resources for both crops are (20.49%,67.98%) respectively, and the average percentage of self-sufficiency in water resources are (79.51%,32.01%) respectively, and the average unit productivity of irrigation water for both crops is (0.19,0.10) kg/m3 respectively during 2000-2022.The average for the water needs of wheat and rice crops during the study period were (6.04,10.19) m3/kg respectively, the average amounts of water used in local production for both crops are (14.23,4.01) billion m3 respectively, the average amounts of virtual water imported for both crops are (6.19,10.03) billion m3 respectively, and the average value of the imported virtual water for both crops is (382,529) thousand dollars during the period 2000-2022. The study recommended to taking in account these concepts in plans of production and distributing irrigation water.</p>
Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Population Therapeutics And Clinical Pharmacology
Kinetic and thermodynamic study of adsorption of an industrial food dye using Iraqi clay
...Show More Authors

View Publication Preview PDF
Clarivate Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE ATTRACTIONS ELEMENTS OF TELEVISION ADVERTISING AND THEIR RELATIONSHIP TO CONSUMER PREFERENCE: THE ATTRACTIONS ELEMENTS OF TELEVISION ADVERTISING AND THEIR RELATIONSHIP TO CONSUMER PREFERENCE
...Show More Authors

The research aims to study the elements of attraction in television advertising and determine their relationship to consumer preferences, the extent to which the sample (250) watches television advertisements, and the motives for viewing. Males and females, and the statistical program spss was used to analyze the results using percentages, arithmetic mean, correlation coefficients ch2, Pearson’s coefficient and Alpha Cronbach for the stability of the test, and the research came to the conclusion that the percentage of watching television advertisements is good motivated by the identification of new goods and services in the market, as advertisements sometimes achieve consumer preferences, and the most prominent The forms that a

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Open Agriculture
Interannual variations of normalized difference vegetation index and potential evapotranspiration and their relationship in the Baghdad area
...Show More Authors
Abstract<p>A monthly correlation between urban vegetation growth and potential evapotranspiration (PET) is needed for better knowledge of controlling water resources and organized irrigation processes. This study aims to explore their relationship within an urban area like Baghdad, using a linear regression model to derive a best-fit line drawn in a scatterplot on a monthly time scale. Based on two different monthly data sources: weather variables (e.g., air temperature, solar radiation, and relative humidity) and Sentinel-2 satellite imagery of 2 years, 2018 and 2021, this study presented the interannual variations of PET and normalized difference vegetation index (NDVI). The choice of these ye</p> ... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The relationship between organizational culture and administrative creativity among colleges' deans and their assistants in Baghdad University
...Show More Authors

Generally, the academic facilities necessitate specific criteria to be under the regional standards such as creative leaders, and a positive climates that induce to create an organizational culture within the academic institution. Consequently, these variables promote to improve the educational and administrative performance pursuing to achieve the general objectives. Thus, the current research aims to explore the level of privileged organizational culture among Baghdad University Colleges, explore the administrative creativity of deans and their assistants in addition to identify the relationship between them. The researchers prepared two instruments which were distributed among (70) individual of the targeted sample to collect the requ

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Numerical Simulation of Unsaturated Soil Water from a Trickle Irrigation System for Sandy Loam Soils
...Show More Authors

Trickle irrigation is a system for supplying filtered water and fertilizer directly into the soil and water and it is allowed to dissipate under low pressure in an exact predetermined pattern. An equation to estimate the wetted area of unsaturated soil with water uptake by roots is simulated numerically using the HYDRUS-2D/3D software. In this paper, two soil types, which were different in saturated hydraulic conductivity were used with two types of crops tomato and corn, different values of emitter discharge and initial volumetric soil moisture content were assumed. It was assumed that the water uptake by roots was presented as a continuous sink function and it was introduced into Richard's equation in the unsaturated z

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Energy Ecological Environment
Removal of pathogenic bacteria from synthetic contaminated water using packed bed silver nanoparticle-coated substrates
...Show More Authors

In this study, a packed bed was used to remove pathogenic bacteria from synthetic contaminated water. Two types of packing material substrates, sand and zeolite, were used. These substrates were coated with silver nanoparticles (AgNPs), which were prepared by decomposition of Ag ions from AgNO3 solution. The prepared coated packings were characterized using scanning electron microscopy, energy-dispersive X-ray spectroscopy and transmission electron microscopy. The packed column consisted of a PVC cylinder of 2 cm diameter and 20 cm in length. The column was packed with silver nanoparticlecoated substrates (sand or zeolite) at a depth of 10 cm. Four types of bacteria were studied: Escherichia coli, Shigella dysenteriae, Pseudomonas aerugi

... Show More
Crossref (5)
Crossref