Terrorism is a serious problem for many societies today. This research aims to identify the impact of terrorism and displacement crisis on human security, which was a shock to the Iraqi society in terms of its impact on the psychological, social and economic conditions of the individual, family, and society. The variety of methods of carrying out the terrorist operations that resulted from the phenomenon of human displacement witnessed by Iraq since the middle of 2014. This phenomenon has its demographic, political and social dimensions.
In order to achieve the goal of this study and the importance of the subject, the social survey method was used by selecting a sample of 200 IDPs in a compou
... Show MoreThe Study aims to show the role of Flexible Budget in planning and control The Factory over head.
The study consists four reaserchs the First introduction for the role of Budget in planning and control The second definition Flexible Badget the Third Factory overhed cost variances Analysis The four conclusions and recommendations.
The factory overhead cost represents great ratio from product cost so the management must planning and control on cost Through the year by the Budget of factory over head in the beginning of the year and determind overhead rater.
The crude enzyme Nattokinase produced by Bacillus subtilis was used in ripening cheddar cheese by adding three concentration of enzyme 80, 160 and 320mg/Kg beside the control treatment without enzyme, the product was checked for three months to determine humidity, protein, fat, non-protein nitrogen, soluble nitrogen and pH, sensory evaluation was conducted, it was noticed that the variety in protein percentages and the soluble nitrogen percentage during second month of ripening for T2, T3 and T4 treatments were (11.2, 15.54 and 18.48) respectively, in comparison with control which was 7.6%, while in the third month it was (17.37, 20.67 and 22.26) respectively, in comparison with control which was only 10%, on the other hand, non-protein
... Show MoreBackground: Nanotechnology has emerged as a pivotal domain in material science research with extensive applications across various sectors including biotechnology and medicine. Nanoparticles offer unique properties facilitating advancements in nanobiotechnology, particularly in nanomedicine, to combat bacterial infections and antibiotic resistance. This study aimed to determine the application of nanoparticles, specifically nano-TiO2, in treating plasmid-mediated antibiotic resistance in both Gram-negative and Gram-positive bacteria. Method: We evaluated antibiotic and nanomaterial sensitivity through disc diffusion and broth microdilution assays. Plasmid curing experiments were conducted using varying concentrations of nano-TiO2 an
... Show MoreThe research discusses the formal transformation in urban structure, all the cities around the world have undergone a series of formal transformations, resulting in radical transformations to their functions. And to calculate this transformation the descriptive analytical method was applied to this research. First, local urban management data and Landsat-9 visual data were used after processing by GIS. Then, the data were processed mathematically based on their engineering sequences. The aims of this research were as follows: to explore the formal transformations in cities, their dimensions and their consequences and impacts; to identify the underlying causes of their occurrence by deriving realistic results from trends in such degrees of t
... Show MoreThis study aimed identify the teachers of sociology. In the development of creative thinking. I have students in middle school .llvra literary. In schools. Second Karkh From the perspective of the teachers and the students themselves numbered (41), a teacher and a school. As The study population encompassed of some students the fourth and fifth preparatory stage in the Karkh II schools, totaling 200 male and female students. As the study sample were consisted of (7) and a teacher (34) and accented (85) of male students (115) were female student The researcher the questionnaire which consisted of (39) items And to achieve the objectives of the study it was ascertained sincerity And stability. And
... Show MoreIn 1939, the Japanese scientist Michio Takaoka first mentioned resveratrol from Veratrum grandiflorum O. Loes. Majority of plants, such as grapes, berries, and peanuts, are significant sources of resveratrol, a well-known polyphenolic. resveratrol (RV) is noted for its links to several health care benefits, including glucose metabolism, anti-aging, cardioprotective, neuroprotective, antitumor, antidiabetic, and antioxidant effects. Importantly, there have been reports of promising therapeutic qualities in atherosclerosis, dementia, and various malignancies. These properties are controlled through a number of cooperative techniques, which control inflammation besides the effects of oxidative stress and cell death. However, circulating resver
... Show MoreThe solar eclipse occurs at short time before the crescent birth moment when the moon near any one of moon orbit nodes It is important to determine the synchronic month which is used to find Higree date. The 'rules' of eclipses are:
Y= ± 0.997 of Earth radius , the solar eclipse is central and 0.997 < |Y| < 1.026 the umbra cone touch the surface of the Earth, where Y is the least distance from the axis of the moon's shadow to the center of the Earth in units of the equatorial radius of the Earth.
A new model have been designed, depend on the horizontal coordinates of the sun, moon, the distances Earth-Moon (rm), Earth-sun (rs) and |Y| to determine the date and times of total solar eclipse and the geogra
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos