The research aims to identify the concept of green taxes and their role in reducing environmental pollution through the poll of Abnh of taxpayers and employees of the General Authority for taxes totaling 200 individual .autam adoption of the resolution as a tool head for the collection of data and information from the sample and analyzed their responses using a statistical program (spss - 10), and calculating the percentages and the arithmetic mean, standard deviation and research found to a number of conclusions, notably the lack of legislation with the challenges and the difficulty of the existence of a measure or a standard lack of planning for the application of environmental taxes that the state taxation application between the General Commission for taxes and the Ministry of environment and the most important recommendations were to issue the necessary legislation in the field of tax collection and environmental fines for environmental pollution and damage caused to life and the elements of the environment and human safety. The introduction of quality and environmental management systems, environmental standards need to find a match with local ingredients and process consistent with international standards and applications so as to ensure the imposition of environmental controls on polluting activities to the environment.
The research is a vision of the future of industry in Iraq, so it is may be outside the ceiling of the capabilities of the Iraqi economy, and therefore it is exaggerated. Therefore, future plans must be applicable through the availability of capabilities. Everyone knows that the financial and administrative corruption and mismanagement of resources are the main cause of the inefficiency of the industrial sector, and the failure to exercise its real role in achieving economic development.; as well as the political situation and the dominance of parties and their insistence on addressing positions that have a strong relationship in managing the economic sector that has a significant impact on drawing the economic map in its current
... Show MoreIs a day or series of days celebrated by Jews for religious or worldly important event in Jewish history as an occasion in Hebrew is called Eid יום טוב good day or good or חג תענית celebrate the festival or celebration. Most of the Jewish holidays are of a religious nature, and there is a worldly character with festivals such as the Festival of Lights חג החנוכה the holiday of Purim and the holidays, although a religious appearance, but she celebration in mundane aspects of the history and traditions of the Jewish occasions. Mass over the holidays when Jews are those mentioned in the Bible in my Leviticus and Deuteronomy. And some holidays established by rabbis in the vicinity of the anc
... Show MoreBackground:Sun protection is one of the most important steps of skin care as it is necessary to protect the skin from ultraviolet rays that is known to cause number of harmful effects on the skin in long and frequent exposure. Objective:To assess the awareness of the medical students regarding sun exposure and its harm,study their sun protection attitudes,practices, their use of sunscreens, and to know if they can share information to other people to encourage such important protective methods and behaviours which are not well established in our community.Patients and method:This cross-sectional descriptive study included 300 students both females and males of fourth and fifth grade of College of Medicine in university of Baghdad.Results:M
... Show MoreThis research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for
... Show MorePurpose: The purpose of this study was to clarify the basic dimensions, which seeks to indestructible scenarios practices within the organization, as a final result from the use of this philosophy.
Methodology: The methodology that focuses adoption researchers to study survey of major literature that dealt with this subject in order to provide a conceptual theoretical conception of scenarios theory .
The most prominent findings: The only successful formulation of scenarios, when you reach the decision-maker's mind wa takes aim to form a correct mental models, which appear in the expansion of Perception managers, and adopted as the basis of the decisions taken. The strength l
... Show Moreفي كثير من الأحيان يفشل تحليل المربعات الصغرى (LS) تماماً في حالة وجود قيم شاذة في الظواهر المدروسة، اذ ستفقد OLS خصائصها ومن ثم تفقد صفة المقدر الخطي الجيد Beast Linear Unbiased Estimator (BLUE) لِما تسببه الشواذ Outliers من تأثير سيئ علـى نتـائج التحليـل الاحـصائي للبيانـات اذ أن وجودها يؤدي الى إرباك كبير في تحليل البيانات في حالة إستخدام الطرائق التقليدية، ولعلاج هذه المشكلة تم تطوير أساليب إحصائية جديدة بحيث لا تتأثر بالقي
... Show MoreData hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreImpressed current cathodic protection controlled by computer gives the ideal solution to the changes in environmental factors and long term coating degradation. The protection potential distribution achieved and the current demand on the anode can be regulated to protection criteria, to achieve the effective protection for the system.
In this paper, cathodic protection problem of above ground steel storage tank was investigated by an impressed current of cathodic protection with controlled potential of electrical system to manage the variation in soil resistivity. Corrosion controller has been implemented for above ground tank in LabView where tank's bottom potential to soil was manipulated to the desired set poi
... Show MoreThis study try to discovering continuity in heritage, from its engaged with emotional side, the core of study is Islamic architectural, these architectural result still estate with time, due to role of it with Islam law, importance of continuity from finding real things of essential architects result The research reaching to concept of thoughtstaying, for Islamic heritage, as basic factor in continuity process by it is architecture. The mostly searches seeing imitation of figures as recently events, or as final result to stage conditions state, but we must remember the Islamic thinking as base stone to architecture results
.
The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show More