Abstract
Agricultural investment is one of the main requirements in most economies of the world for its importance in the development of the agricultural sector through the agricultural and technological infrastructure and agricultural research, as well as its impact on most economic, social and service activities, especially if managed and employed scientifically, which generates income and productive capacities and services and new commodities, Unemployed as agricultural investments in Iraq fell significantly after 2003 due to economic, political, social
Aims of this research to determine asbestos fibers levels in surrounding air of some crowded sites of Baghdad city were monitored in summer 2020. Collection of samples was conducted by directing air flow to a mixed cellulose ester membrane filter mounted on an open‑faced filter holder using sniffer a low flow sampling pump, samples of air were collected from five studied areas selected in some heavy traffic areas of Baghdad city, (Al-Bayaa and Al-Shurta tunnel, Al-Jadriya, and Al-Meshin commercial complex, control), then analyzed to determine concentrations of asbestos fibers. Counting of asbestos on the filters was carried out through using both scanning electron microscope SEM and an energy dispersive X‑ray system EDS to count
... Show MoreGiven the importance that the Iraqi banking system in general and Islamic banks in particular, there must be effective supervisory oversight of these banks, as supervisory oversight has an essential and effective role in the development and evaluation of the performance of banks, through the application of legal controls and rules. Banking aimed at making sure that its financial centers are safe, protecting depositors' funds, and achieving both monetary and economic stability. This research studied and evaluates the mechanisms and tools used by the Central Bank of Iraq in the supervision and supervision of these banks. Therefore, the research aimed to measure the type and direction of the relationship between the requirements of supervis
... Show MoreNominal ellipsis is a linguistic phenomenon found in English and Arabic .It is
based on leaving out a part of a nominal construction or more for the sake of good
style , compactness and connectedness .This phenomenon is found in the language of
the Glorious Qur’an .The study in hand is concerned with how translators handle
translating Qur’anic verses which contain ellipted nouns , i ,e. , to what extent the
translated Qur’anic verses are close to the original ones , and to what extent their
translations serve understanding the meanings of the glorious verses while at the
same time maintaining their beauty in style. The study aims at shedding light on
nominal ellipsis in English and Arabic .The study undertak
This study aims to investigate the academic leaders’ perceptions towards the degree of availability of the dimensions of organizational immunity systems at the University of Tabuk, as well as to reveal the statistically significant differences between the average responses of the study sample members about the degree of availability of these dimensions at their university due to the variables of (gender, leadership position, and college specialization). To achieve the objectives of the study, a descriptive survey method was used. The study population consisted of (200) male and female leaders who were academic leaders at the University of Tabuk. A questionnaire was used as a tool for collecting data, which its validity and reliability
... Show MoreTesting the current research and effect correlation between Transformational leadership variable manufacturing and variable administrative creativity, as it represented the research problem the extent of the role of transformational leadership in achieving administrative creativity in the office of the Iraqi Ministry of Education, it has been used questionnaire as a tool for data collection, as is the distribution (32) for the sample of the research, which was selected intentional and as director general and assistant general manager and director and deputy director and head of the Division, and represented the premise of the major search existence of liaison and the impact of significantly between transformational leadership and achieve
... Show MoreThis research was carried out to evaluate the activity of crude juice of Olive on some cytogenetic parameters in mice like chromosomal aberration (CAs) and micronuclei formation(MN). The results showed that there was no significant difference between the crude juice (green and black)in CAs(3.77,4.10)and MN(0.25,0.25) in comparison with negative control (3.39,0.22)respectively. The interaction effect between the crude before and after treatment with mutagen MMC showed that the crude is one of the vital inhibitors of the mutagen by its ability in reducing the percentages of both the CAs and MN in bone marrow cells in mice.
Research aims (Quality and originality in scientific research from the point of view of the participants in the course (qualification of scholars of Bayt al-Hikma) To find out how satisfied the participants about the training course held by the house of wisdom (research community), To develop and maximize the capacity of researchers in the field of writing scientific research, As well as establishing frameworks and concepts and standards related to quality and authenticity scientific research, The role played by this kind of research in the service of the movement of the human journey towards progress and prosperity.
On this basis was the research community, their number was (23) common t
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show More