Scorpions and spiders belong to the class Arachnida in phylum Arthropoda. Scorpions are easily distinguished by median eyes on obvious the center of the carapace and have one pair, and lateral eyes have 2-8 in some species. Scorpions do not have good eyesight so the median eyes have always been simple and they are more sensitive than the lateral pairs. They have anterior median eyes (AME) with narrow field of view and pairs of lateral eyes (LE) with more sensitivity and response to light. Family Buthidae have 2-6 lateral eyes in Compsobuthus Mesobuthus, Hottentotta, while Vaejovidae, Chactidae and Chaerilidae have 2 pairs of lateral eyes. In addition, 3 pairs are found in Orthochirus and Androctonus. Spiders have six eyes in family Pholicidae, Sicariidae, Araneidae, Salticidae, while eight eyes in Theridiidae, Lycosidae and some with two eyes or four in the carapace of the prosoma. Spider have anterior median eyes, anterior lateral eyes, posterior median eyes, or posterior lateral eyes. Scorpions and Spider eyes are not compound but simple. There is one lens for each eye. Spiders have poor vision, not able to see light and darkness. Scorpion and spider taxonomy is based on the forms and number of eyes. So, the reasons to study these organisms are important in studies of medical, ecology, morphology and taxonomy. and it is a little known about their biology and fauna.
The ground state proton, neutron, and matter density distributions and corresponding root-mean-square radii (rms) of the unstable neutron-rich
22C exotic nucleus are investigated by two-frequency shell model (TFSM) approach. The single-particle wave functions of harmonic-oscillator (HO)
potential are used with two oscillator parameters bcore and bhalo. According to this model, the core nucleons of 20C are assumed to move in the model
space of spsdpf. Shell model calculations are performed with (0+2)hw truncations using Warburton-Brown psd-shell (WBP) interaction. The outer (halo) two neutrons in 22C are assumed to move in HASP (H. Hasper) model space (2s1/2, 1d3/2, 2p3/2, and 1f7/2 orbits) using the HASP interaction. The halo st
A field experiment was conducted in the growth season 2019-2020 at the botanical garden of the Biology Department at the College of Education for Pure Sciences/Ibn Al-Haitham, University of Baghdad-Iraq. The experiments’ purpose is to determine the effects of different melatonin concentrations on some morphological and physiological characteristics of mung (Vigna radiata L.) plant under the influence of three periods of drought (5, 10, 15 days). The results were showed that the increasing of water stress periods had significant effects in the reducing rates of the studied characteristics, especially at the period 15 days. The external treatment of different concentrations of melatonin reduced the drought effects and that’s led to signif
... Show MoreThe process of identifying the region is not an easy process when compared with other operations within the attribute or similarity. It is also not difficult if the process of identifying the region is based on the standard and standard indicators in its calculation. The latter requires the availability of numerical and relative data for the data of each case Any indicator or measure is included in the legal process
Abstract: This study was aimed to investigate the effect of two doses of pregabalin (PGB) on hormonal level and sexual activity in female albino rats. Ninety female rats with age (9-10 weeks) and weight (200±20 g) were divided into three major groups of thirty rats. First group was considered as control G1, the second G2 and third G3 groups were exposed to PGB into two doses 150, and 300 mg/kg body weight per day respectively. Each major group was divided into three subgroups (subgroup A, B, and C of each has ten rats), the treatments last for one month for subgroup A, two months for subgroup B, and three months for subgroup C. Five rats from each subgroup were placed separately into two breeding cages with two isolated males and wait
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreThis research sheds light on the morphological construction of kitchen terms in Hebrew language, especially methods of derivation, by offering an extensive review of the most important methods of morphological derivation. The field of kitchen terms is a fertile and rich field, where we see daily production of new kitchen tools which require suitable names with specific meanings. Morphologically, the research interested in methods of morphological derivation. So as to know and identify the common and effective methods to derive the kitchen terms in Hebrew language, in addition to put a special glossary of these terms. The research found that most of the kitchen terms were derived according to the methods of derivation prevailing in Hebrew la
... Show MoreIn low-latitude areas less than 10° in latitude angle, the solar radiation that goes into the solar still increases as the cover slope approaches the latitude angle. However, the amount of water that is condensed and then falls toward the solar-still basin is also increased in this case. Consequently, the solar yield still is significantly decreased, and the accuracy of the prediction method is affected. This reduction in the yield and the accuracy of the prediction method is inversely proportional to the time in which the condensed water stays on the inner side of the condensing cover without collection because more drops will fall down into the basin of the solar-still. Different numbers of scraper motions per hour (NSM), that is
... Show MoreThis research delts with study seven species of seeds and wild varieties wild belonging to the genus Medicago L., these species are: M. constricta Dur., M. coronata (L.) Bartal., M. intertexta (L.) Mill., M. intertexta.var. ciliaris (L.) Hyen., M. laciniata (L.) Mill., M. lupulina L., M. minima (L.) Bartal. and M. sativa L., the research involved characteristics of shapes, dimensions, colors and the nature of the surface ornamentation of seeds and also the hilum site. the seeds forms ranged between crescent, reniform and ovate, in addition there was a clear difference in seeds dimensions in height and width, while, the color has been vary between light brown to brown and dark brown. The nature of the surface ornamentation was smooth, retic
... Show More