The ancient Iraqis in the Mesopotamian civilization practiced various sports activities and physical exercises to develop their physical fitness until these practices became a part of their lives and accompanied their religious, social, and military celebrations. Music had a presence in many sports scenes, and the presence of musicians and musical instruments with the armies indicated its great role. In the military scene, the research aims to shed light on the archaeological evidence and evidence of the integration of music with the sports and military scene in Mesopotamian civilization and to explore the impact of music in the sports and military scene of Mesopotamian civilization. The historical approach was adopted in collecting and describing historical information and analyzing it by relying on Based on several scientific references and academic studies. The most important conclusions were the connection between music and sports activity in the Mesopotamian civilization and its contribution to motivating athletes, increasing their enthusiasm with attendance, improving motor performance, and controlling the movement of athletes. Music was also part of the military strategy as it accompanied the organization and movements of armies in battles, and was considered a source for raising the enthusiastic spirit and morale of the fighters.
The research aims to identify the most important difficulties facing the scientific research in the technical university in the financial, organizational and administrative according to the quality standards according to the paragraphs studied in the questionnaire questionnaire prepared for this purpose, including the research community on the Central Technical University, which includes several technical colleges and technical institutes were selected A sample of the researchers in the Institute of Technical Management where the number of training was 78 teachers took a random sample of researchers amounted to 40% of the questionnaire, and after the collection and classification of data were used statistical means, including the mean ar
... Show MoreThe present study was investigated the activity of aqueous extract from Cinnamomum cassia bark on the blood glucose levels in healthy and diabetic rats induced by Streptozotcin (STZ). In healthy rats the blood glucose levels were slightly decreased after six hoursof single oral administration with dose (25 mg/kg) of body wight, as well as four weeks after twice daily repeated oral administration of aqueous extract of Cinnamomum cassia bark. In streptozotocin induced diabetic rats we absorved high significant decreased (p<0.05) in blood glucose levels, after four weeks of oral administration of aqueous extract (25 mg /kg ).And blood glucose levels seems to be normal after the period of treatment .Glibenclamide used as standard drug to com
... Show MoreThis study was carried out at University of Baghdad - College of Agricultural Engineering Sciences - research station B during the fall season of 2019-2020, in order to evaluate the effect of Ozone enrichment and the foliar application of organic nutrient on nutrient and water use efficiency and fertilizer productivity of broccoli plant using the modified NFT film technology. A factorial experiment (2*5) was carried out within Nested Design with three replicates. The ozone treatment was distributed into the main plots which consisted of oxygen (O2) and ozone (O3). The foliar application of organic nutrients were distributed randomly within each replicate including five treatments, which were the control treatment (T0), Coconut wat
... Show MoreThis study was carried out at University of Baghdad - College of Agricultural Engineering Sciences - Research Station B during the autumn season 2019-2020, in order to evaluate the effect of Ozone and the foliar application of coconut water and moringa extract on the growth of broccoli plant grown in modified NFT film technology. A factorial experiment (2*5) was carried out within Nested Design with three replicates. The ozone treatment was distributed into the main plots which consisted of oxygen (O2) and ozone (O3). The foliar application of organic nutrients were distributed randomly within each replicate including five treatments, which were the control treatment (T0), Coconut water with two concentrations of 50 (T1) and 100 ml.
... Show More
Our research was launched in the study of the sustainable conflict of globalization and the rebalancing of the great powers that have made life on the earth unstable and insecure over the past and present eras, the purpose of which is to pay attention to the waste and instability that human societies are exposed to in different proportions between abstract right and continuous deviation.
The purpose of the study is to show the loss, waste and backwardness in managing and governing societies towards private interests, away from the standards of good institutional governance.
The study’s design was based on two demands, the first on the nature and eternity of
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More