The research aimed to determine the role of the agricultural extension in educating farmers about the legislation on the protection of the rural environment from pollution with chemical pesticides working in the Department of Agricultural Extension and Training and the Department of Agricultural Extension in the directorates of agriculture of Najaf and Qadisiyah, and to determine the role of the agricultural extension in the axis of farmers' use of the correct methods to protect the rural environment from pollution with chemical pesticides and the axis of the reasons that lead farmers to pollute the rural environment with chemical pesticides, and to achieve the objectives of this research prepared A questionnaire in the light of rev
... Show Morebjective researcher through this research to Put a theoretical framework to strategic orientation the center on the market in the business and the diagnosis and interpretation of the nature of the link between relationships and influencing strategic orientation dimensions Almtmthelh organizations (Entrepreneurial Orientation, market Orientation, Interaction Orientation) and the performance of the Iraqi Private Banks The research community and the level of dimensional and through the use of scale (Balanced Scorecard) Bmnzawradtha the four, the test of this research in the Iraqi banking sector (Gulf Commercial Bank
... Show MoreThe research aims to use performance indicators and financial criteria in evaluating the economic feasibility of the company's insurance portfolios. In addition to identifying the strengths and weaknesses in portfolio's performance to enhance the strengths and address the weaknesses. This is consistent with research problem that dealt with the performance indicators, economic feasibility of company's portfolios and contributing to their improvement, reducing the financial and insurance risks associated with company's business. The research’ sample is represented by the Iraqi Insurance Company as it is one of the oldest financial institutions operating in the insurance sector. It has identified (5) insurance portfolios (marine, engineer
... Show MoreFrom 1979 to 1999 several theatricl groups had produced (Mackbeth) by shakespear which were directed by different director and the role being played by different actors. So the questions are: How did those a Iraqi actors approach that character by their performance? Did they interpret the character Truelly as the poet wanted to be. The researcher aims to find out the true performance by the actor who impersonate (mackbeth) as a wicked personality, who had un rational ambition. The researcher also aims to expose the style of acting fallowed by the Iraqi actors in that play. In chapter of review of literature, The researcher discusses the weaning and procedure of the actor performance which include characterization and transformation. He a
... Show MoreThe research aimed at designing a teaching aid for learning backswing into handstand as well as identifying its effect on learning skill performance. The researchers hypothesized statistical differences between pre and post-tests in favor of the research group. They used the experimental method on six (13 – 16) year–old Baghdad club gymnasts. The researchers used the one group design in which all players perform pretests followed by special tests on the teaching aid than are tested posttests. The researchers conclude that the teaching aid positively affected learning the skill as well as the teaching aid was very good and endured the performance of all gymnasts. The researcher recommended making simi
... Show MoreThis paper aims to study the effects of the long term solar activity on the critical frequencies of ionospheric F1 layer over Baghdad city, during the solar cycle 22, within (1988- 1995). It is found that the critical frequency of this layer is closely related to the sunspots number during the years of the solar cycle 22, at a middle latitude region of the world. The study discussed the effect of sunspot numbers and solar events on the electron densities of F1 layer, which is the most important ionospheric parameter.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More