Some methods recommended abroad to control the oriental hornet, Vespa orientalis L., attacking the honey bee, Apis mellifera L., colonies were tested, with some modifications, for the first time under the Iraqi conditions. One of these methods was carried out by covering the hive entrance with a piece of queen excluder to prevent the hornet from entering the hive. Also, the position of hive stand was reversed to deprive the hornet from using the flight board as a stage for waiting and creeping toward the defending bees. The second method was carried out by fixing a cardboard cone as a bee passage at the hive entrance to hinder the entry of the hornet into the hive. Both of these methods were found to be unsuccessful to
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThe treasury bills one internal government debt instruments in iraq that were used to finance temporary deficits in the government budget, There fore the government resorted to issuing for the purpose of providing liquidity, As well as to invest in productive progects, After that it was financing the budget deficit by the monetary authovity of the central baalpennek [the new cash velease] which led to negative effects on the Iraqi econome, Thus we find that the treasury transfers have formed alarge proportion of the gross domestic government debt to finance the deficit ayear ago 2003. &nbs
... Show MoreObjectives: The main objective of this study is to examine the crucial role that Russian writers and intellectuals played in catalyzing the 1905 Revolution in Russia. Specifically, the study sought to analyze how their literary works, philosophical ideas, and political writings challenged Tsarist autocracy, depicted the suffering of the masses, and inspired opposition movements. The study aimed to highlight the defiant writings that contributed to the rise of political figures and the eventual overthrow of the repressive regime. Methods: The historical narrative and analytical methods were employed, conducting a comparative analysis of prominent works by renowned authors such as Tolstoy, Gorky, and Chekhov. This analysis focused on
... Show MoreIH Abdul-Abbas, QJ Rashid, M RasimYounus, PalArch's Journal of Archaeology of Egypt/Egyptology, 2021 - Cited by 9
The indirect monetary policy tools led to financial stability for the period being studied through the use of indicators of financial stability (aggregate) to show the effect of the foreign reserves of the Central Bank of Iraq and its indirect instruments in achieving financial and economic stability, especially after the significant decline in oil prices and dependence of the Iraqi economy on Oil (rent) and lower reserves of the Central Bank of Iraq after 2014 and now compared to previous years, the goal of this research is to achieve financial stability according to selected indicators and achieve an optimal monetary policy to achieve the development goals of The economic policy in the country. Standard models were used to test
... Show MoreAbstract:
The research aims to identify how to audit potential liabilities and contingent liabilities in light of the pandemic and its reflection on the auditor's report. The research problem is represented by the complexity of the process of checking potential liabilities and contingent liabilities in insurance companies, which was negatively reflected in the auditor's neutral technical opinion. The researchers hypothesize that auditing potential liabilities and contingent liabilities in light of the Corona pandemic is positively reflected in the auditor's report. The research concludes that the process of checking potential liabilities and contingent liabilities is
... Show More