This work presents external morphological study of the leafhopper Empoasca decedens
Paoli, 1932 particularly male genitalia, which were dissected and illustrated.
The genus Empoasca Walsh (Typhlocybinae: Empoascini) contains small, slender, fragile
and generally green leafhoppers. The overall length ranges from 3-3.5 mm. Members of this
genus are charachterized by their uniformly green color, inner and outer apical cells of
forewing not attaining wing apex, second and third apical cells are sessile or triangular or
even short stalked, submarginal vein of hindwing extends around wing apex and turned
beneath costal margin, apical thirds of tibiae and tarsal segments including claws are
prominently green while other
Background: This study aimed to determine whether there is a relationship among the bite force with facial dimensions and dental arches in a sample of Iraqi adults with Class I skeletal and dental relations. Materials and methods: Forty dental students (20 males and 20 females) were selected under certain criteria. For those individuals, dental impressions, frontal facial photographs and maximum bite force at molar and incisor regions were taken. The dental arches widths and facial dimensions were measured using the AutoCAD program 2007, while the bite force was determined using special device. Descriptive statistics for the measured variables were performed and gender difference was determined using independent sample t-test, while the rel
... Show MoreThe research aims to measure the sustainability of the Iraqi economy for the period 1990-2018 as well as to show the impact of fluctuations in the level of GDP on financial sustainability, where financial sustainability is the necessary and sufficient condition for achieving economic and financial balance in the country, as financial sustainability reflects the movement of the state budget and its relationship to GDP through the indicators of deficit, fiscal surplus and public debt internal and external, as well as reflecting the art of managing public debt, and the more managed public debt is achieved, the more the management of public debt is achieved financial sustainability. for the state in the sense that there is a reciprocal
... Show More2 The benefit of the leave of our time is the leakage and inclusion in the series of narrators of modern.
3 The leave is therefore permissible to narrate the hadeeth or other sciences from a sheik or sheiks, and not
the talk.
4 It is not necessary that the grantee of the leave has studied the student who is the holder of the leave.
5 - in which a great meaning is the sense of the recipient seeking blessing through the link
With attribution to our master Muhammad peace be upon him.
This research aims to find out the relationship of risk behavior & job satisfaction for workers in the emergency program in the international relief agency (UNRWA) in the Gaza Strip and the level of each of them, and to achieve that we have been conducting research on the strength of "210" sample employees of the emergency program staff in the international relief agency in Gaza governorates, and try to answer the research questions the researcher through the use of measurements of risk behavior and job satisfaction are two of the researcher, The researcher has used several statistical methods to identify the validity and reliability of scales and access to research and interpretations of the results, and these methods: the m
... Show MoreIn this paper, first we refom1Ulated the finite element model
(FEM) into a neural network structure using a simple two - dimensional problem. The structure of this neural network is described
, followed by its application to solving the forward and inverse problems. This model is then extended to the general case and the advantages and di sadvantages of this approach are descri bed along with an analysis of the sensi tivity of
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreWars represent one of the most serious threats to the world order; It is considered a violation of international laws and norms, and humanitarian principles. From this point comes the study of the importance of the topic entitled (The Future of the Russian-Ukrainian war and the extent of its Reflection on the security of Eastern European countries after the year 2022). This study is based on reviewing future possibilities (scenarios) of war. The Russian-Ukrainian war, which was launched by the Russian government led by Russian President Vladimir Putin in February 2022, is still ongoing at the time of writing this research. This chapter includes three possibilities (scenarios). The first possibility deals with the development of the war t
... Show MoreAnd after:
There are many aspects of inference in the Holy Qur’an, whether it is evidence, evidence, argument, authority, or proof.
These expressions or expressions are close in meaning to each other in appearance, but the Qur’an used them all in their exact place, so every word in the Qur’an has its own use that was set for it, and no other word can replace it even if it is close in meaning to it. And these aspects that the Qur’an mentioned as evidence for the aspects of inference in it may come to be mental, textual, or tactile evidence.
The Qur’an exalted the importance of evidence and proof in its religion, and entrusted it with confirming and rejecting the plaintiff’s claim, regardless of its subject matter