At a time when any tourist in the world wants a trip to reload his energy and enjoy peace and quiet and engage in adventures in a safe environment, terrorism comes to disturb him on that journey through operations aimed at the tourist and entertainment destinations, such as shops, restaurants, cafes and hotels Is the orbit of research) for many reasons. The security measures taken by hotels play an important and fundamental role in preventing or limiting these terrorist operations. At the same time, while some hotel administrations are constantly seeking to improve these measures to preserve the safety of their guests and visitors, In spite of the high number of attacks on hotels since 2001 and today. This research is intended to highlight the extent to which civil hotels are responsible for the victims of terrorist operations.
The research aimed to determine the role of the agricultural extension in educating farmers about the legislation on the protection of the rural environment from pollution with chemical pesticides working in the Department of Agricultural Extension and Training and the Department of Agricultural Extension in the directorates of agriculture of Najaf and Qadisiyah, and to determine the role of the agricultural extension in the axis of farmers' use of the correct methods to protect the rural environment from pollution with chemical pesticides and the axis of the reasons that lead farmers to pollute the rural environment with chemical pesticides, and to achieve the objectives of this research prepared A questionnaire in the light of rev
... Show MoreThe research aims to verify that there is an influence between innovative marketing and the organization's reputation by brand mediation.
The research problem is that the Oil Marketing Company (SOMO) needs innovative, unconventional methods in marketing its products and improving its reputation by adopting a solid brand that adds value to the product.
The importance of the research: The importance of the research is highlighted as it deals with essential variables in business organizations that help increase customer loyalty by adopting a distinctive brand.
The research started from four main hypotheses to explore correlations and influence between researc
... Show MoreThe study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show MoreBackground: Relapse of previously moved teeth, is major clinical problem in orthodontics with respect to the goals of successful treatment. This study investigated the effect of orthodontic relapse on the proliferation of fibroblast and epithelial rests of Malassez cells in periodontal ligament of rat molars. Materials and Methods: Sixteen ten-week- old male Wister rats were randomly divided into four groups composed of four animals each: Group I received no orthodontic force (control). In both Group II and Group III, uniform standardized expansive springs were used for moving the maxillary first molars buccally for periods of one and three weeks respectively. The spring initially generated an average expansive force of 20 g on each side.
... Show MoreThis research shows the issues of Ibn Hisham's illusion in its leadership of the grammarians; As Ibn Hisham attributed - during his presentation of grammatical issues - grammatical opinions to a number of grammarians claiming them in them, and after referring to the main concepts that pertain to those grammarians, we found that Ibn Hisham had delusional in those allegations, in addition to that clarifying the terms illusion and claim in the two circles of language And the terminology, and perhaps the most prominent result in this research is that he worked to investigate these issues by referring to their original sources, with an explanation of the illusions of Ibn Hisham in his attribution to these issues.
Hall effect measurements have been made on a-As2Te3 thin films different thickness film in the range (200-350) nm. The Hall mobility in a-As2Te3 thin films decreases with increasing annealing temperature but the carrier concentration increases. When increasing the film thickness increases the Hall mobility decreases, while the carrier concentration increases.
In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
This search aim to measure Hardness for Epoxy resin and for unsaturated Polyester resin as base materials for composite Hybrid and the materials used is Hybrid fiber Carbon-Kevlar. The Hand Lay-up method was used to manufacture plates of Epoxy resin (EP) and unsaturated Polyester EP,UPE backed by Hybrid fiber (Carbon-Kevlar) and with small volume fraction 5,10 and 15 for every there are Layer of fibers (1,2 and 3). The hardness test was count for material EP, UPE resin and there composites and that we notice that the Hardness (HB) decreased with increase of temperatures.
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThis study aimed to investigate the ability of clove and cinnamon extracts to make pathogenic multidrug-resistant (MDR) Klebsiella pneumoniae more sensitive to the host’s immune system and thereby interrupt the bacterial infection process in the rat model. Therefore, 60 Wistar male rats were used in this study. The phytochemical constituents of the plant extract were analysed using the gas chromatography-mass spectrometry (GC-MS) technique. Then, the capability of the plant extracts, as prophylactic and treatment, against K. pneumoniae in rats was studied by estimating the complete blood counts (CBCs) and the serum concentrations of interleukin-4 (IL-4) and interferon-gamma (IFN-γ) before and after the treatment. The results showed that
... Show More