تعد التغيرات المناخية قضية بيئية عالمية وشاغلاً مشتركاً للبشرية وهي نتيجة حتمية للتطور الحضاري، لاسيما بعد قيام الثورة الصناعية، فقد كان الاستهلاك غير العقلاني لموارد الطبيعة والتوسع العمراني على حساب المساحات الخضراء آثار خطيرة على المناخ الذي يعد من اهم عناصر البيئة الطبيعية لما له من اثر واضح على كافة مجالات الحياة. على صعيد الحالة العراقية يواجه العراق تحديات عدة يفرضها تغير المناخ كارتفاع درجات الحرارة، قلة الامطار، شحة المياه وملوح الاراضي وزيادة نسبة العواصف الرملية والترابية والكوارث الناجمة عنها مما يعرقل التنمية ويعيق جهود الحد من الفقر وتعزيز سبل العيش وتخفيف الصراع للحصول على الموارد الطبيعية هذا من جانب، ومن جانب اخر تعد النساء أكثر عرضة لتغير المناخ وذلك بسبب اعتمادهن على الموارد الطبيعية وأدوارهن اليومية في الحياة والوضع الاجتماعي والاقتصادي لاسيما في الدول النامية مثل العراق.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreAbstract
Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built t
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreObjective(s): The study aims to evaluating the quality of nursing care provided to children under five years to compare between quality related to type of health sectors; to determine the quality of nursing care and to compare between such care in Baquba Health Care Sector I and II.
Methodology: A descriptive study is carried out for the period from December 15th 2019 to May 1st 2020. A purposive "non- probability" sample, of (60) staff nurse and (60) children is selected. An adopted questionnaire has been selected for the study which consists of three parts. The first part is nurses’ socio-demographic characteristic; the second part is ch
... Show MoreThe telecom sector seeks to provide its services to customers in various categories, especially in mobile services, which contributed to the spread of a large number of these companies in the local environment, and mobile operators in this sector to diversify sources of revenue through a series of packages designed specifically to suit The various needs of customers throughout Iraq and the sustainability of their profits, and in view of the lack of requirements for recognition of revenue from the provision of such services in accordance with the unified accounting system applied in that sector, this study aimed to clarify the five steps to recognition of revenue according to me (The contract was concluded with a customer) at Cork Telecom
... Show MoreThe research aimed at designing a rehabilitation program using electric stimulation for rehabilitating knee joint working muscles as a result of ACL tear using an apparatus developed by the researchers that stimulate the muscle vibration and work as well as the ability to rehabilitate the join in shorter periods. In addition to that, it aimed at identifying the effect of this program on rehabilitating the knee joint working muscles. The researchers used the experimental method on Baghdad clubs’ players who suffer from complete knee joint ACL tear aged (19 – 24) years old. The results showed that the training program developed the working muscles significantly achieving normal levels of activity.
Abstract
The research aims to determine the role of the efficiency of Human Resources Information System in the effectiveness of Employees Performance Appraisal System in the Ministry of Higher Education and Scientific Research / Center for the ministry, it was touching the researchers need the ministry to devise methods that employ outputs Human Resources Information System in the organization surveyed for the development of methods and levels of process evaluate the performance of its employees, in order to identify the extent of the role played by human resources information system in the process of assessing the performance of employees, we raised the question of the President as follows:
... Show MoreAbstract:
The current research included " Diagnosis of the reality of the gap for the requirements of Business Continuity Management System According to International Standard (ISO 22301: 2012) in Midland Refineries Company (Daura Refinery) " , for development of an administrative system for Business Continuity is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others . the international legitimacy (represented by the international organization for standardization (ISO)) remains the basis for matching and commitment , and the importance of the application of Business Continuity Management Syst
... Show MoreThe research aims to recognize the impact of the training program based on integrating future thinking skills and classroom interaction patterns for mathematics teachers and providing their students with creative solution skills. To achieve the goal of the research, the following hypothesis was formulated: There is no statistically significant difference at the level (0.05) between the mean scores of students of mathematics teachers whose teachers trained according to the proposed training program (the experimental group) and whose teachers were not trained according to the proposed training program (the control group) in Pre-post creative solution skills test. Research sample is consisted of (31) teachers and schools were distribut
... Show More