Preferred Language
Articles
/
jeasiq-750
Water security in Basra Study economic reality and prospects for future water
...Show More Authors

It  can be said that the Security of water  in  Basra from the visual task vital strategic issues of concern to the attention of researchers in various attributions and those interested in water, environmental, economic, social, cultural and political affairs ... etc. This view of the great importance of the issue of water in the occupied Basra, which is characterized by parochialism and scarcity, When looking at the sources of our daily lives and in our reality today. We find that millions of people living on the two main exporters Tabaaan oil and water. And depleted oil wealth However Manfred him the most attention because we entered it surpasses all other sources of income, but is not it a little water, a source of permanent prosperity was still the lowest in the list of visual priority, We hope the local government in Basra to take care of the issue of water security, and putting it in the top position of priority, and that becomes the interest in this vital issue fateful tops the concerns of the province, and threads that Toady great interest and should be given priority in economic research and studies, especially after the decline of quotas assigned to Iraq as a result of the exploitation of neighboring countries to Iraq's share of water. The search in Shan water security is to discuss the continuing existence and progress

In the field of display research on the study of the economic reality of water resources in Basra and restrict research in the development and the possibility of securing the economic, political, legal and cultural aspects will be focused.                                    

Either in the field of water demand will mean the study determining the size and structure of demand and the prospect of change, as well as to rationalize water use and ensure that the development of Water Media culture appropriate, legal, economic, and administrative procedures

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
3D geological model of Nahr Umr/Ratawi oil field in Basra
...Show More Authors
Abstract<p>The study includes building a 3-D geological model, which involves get the Petrophysical properties as (porosity, permeability and water saturation). Effective Porosity, water saturation results from log interpretation process and permeability from special correlation using core data and log data. Clay volume can be calculated by six ways using IP software v3.5 the best way was by using gamma Ray. Also, Water Resistivity, flushed zone saturation and bulk volume analysis determined through geological study. Lithology determined in several ways using M-N matrix Identification, Density-Neutron and Sonic-Neutron cross plots. The cut off values are determined by Using EHC (Equivalent Hydra</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sun Aug 18 2019
Journal Name
Political Sciences Journal
The challenges of precision axes for futuristic regional relations in the middle east (Iraq after post triumph's period)
...Show More Authors

The research has tackled about an important transformation within the whole region of middle east, especially there were more challenges which revealed under the huge pivotal interests of global powers that ruled the new world order by United states of America ; being very affected over the international and regional relations than any situations appeared previously within political realities. So that, many of variables inside the international scene which happened during of this period of contradicting strategic policies by the process of reforming and restructuring of difficult equations that imposed by international and regional allies and blocs . This article had concentrated over various strategic and political studies which reflect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Correlation Of Economic Attractiveness Measurement Methods With Regulating Factors Of Capital Investment Appraisal In The Public Industrial Companies In Jordan: An Empirical Study
...Show More Authors

The process of capital investment appraisal takes hold the attention of managers and accountants of the industrial companies. This process involves the use of multiple and diverse financial evaluation methods to measure the economic attractiveness of capital investment peojects. This multiplicity and diversity of financial evaluation metods have been the motive of this research to: investigate some organizational variables such as the desired objectives, identify managerial procedures which regulate the capital investment process, specify evaluation methods and examine the relationships between these variables and evaluation methods actually used by a sample of public industrial companies in Jordan.

    The data wa

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
Evaluation of bread wheat Triticum aestivum L. callus genotypes for water stress tolerance using Polyethylene Glycol (PEG)
...Show More Authors

A fixed callus weight of 150 mg was induced from immature embryos of three bread wheat Triticum aestivum L. genotypes (Tamos 2, El-izz and Mutant 1) cultured on nutrient medium {MS) containing Polyethylene glycol (PEG-6000) supplemented with concentrations (0.0, 3.0, 6.0, 9.0 or 12.0%) to evaluate their tolerance to water stress. Cultures were incubated in darkness at temperature of 25?1 ?C. Callus fresh and dry weights were recorded and soluble Carbohydrate and the amino acid Proline concentrations were determined. Results showed that there were significant differences in studied parameters among bread wheat genotypes of which Tamos 2 was higher in callus average fresh and dry weights which gave 353.33 and 38.46 mg/cultured tube respecti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Evaluation of Alum/Lime Coagulant for the Removal of Turbidity from Al- Ahdab Iraqi Oilfields Produced Water
...Show More Authors

The removal of turbidity from produced water by chemical coagulation/flocculation method using locally available coagulants was investigated. Aluminum sulfate (alum) is selected as a primary coagulant, while calcium hydroxide (lime) is used as a coagulant aid. The performance of these coagulants was studied through jar test by comparing turbidity removal at different coagulant/ coagulants aid ratio, coagulant dose, water pH, and sedimentation time. In addition, an attempt has been made to examine the relationship between turbidity (NTU) and total suspended solids (mg/L) on the same samples of produced water. The best conditions for turbidity removal can be obtained at 75% alum+25% lime coagulant at coagulant dose of 80 m

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Reality of Agricultural Policies and Their Role in Achieving Sustainable Agricultural Development in Iraq
...Show More Authors

   The Agricultural Policy is one of the most important tools adopted by the state to guide its economic and social activities through the delivery of suitable agricultural commodities to the consumer and in return to deliver agricultural inputs to the agricultural producers at the lowest possible cost to contribute in achieving a profit that helps the agricultural product to continue in the production process with the same efficiency and ambition. So as to help increase the contribution of the agricultural sector to GDP and achieve the best picture of sustainable agricultural development.

The research aimed at identifying the reality of agricultural policies and their role in achieving sustaina

... Show More
View Publication Preview PDF
Crossref