Preferred Language
Articles
/
3hdGg5ABVTCNdQwCyIuT
Description of New Iraqi Spider Ananeon Howardensis (Arachnida: Salticidae) and the Prey Capture Method
...Show More Authors

Crossref
View Publication
Publication Date
Thu Oct 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Evaluating the Optical Properties of the Schmidt Cassegrain Spider Obscuration Telescope Using Zemax Program
...Show More Authors

Schmidt Cassegrain spider obscuration telescope (SCT) is one of the types of observations operating with a concave mirror. It combines several lenses and mirrors working together as an optical system. The light rays fall into the tube from the main mirror and gather on another smaller mirror called a secondary mirror. Unlike the formation of Newton's telescope, no light is made from the secondary mirror out the side of the tube but is directed to the middle of the main mirror. There is an opening in the middle of the main mirror so the light beam can go out and direct the vision lens system. The secondary mirror is located in the middle of a glass slice and is installed by thin carriers. The function of this board is to correct the portr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
Description of nature and the joys of life in Fatimid poetry
...Show More Authors

This research deals with the aesthetics of describing nature and the joys of urban life in the environment of Fatimid Egypt, among a group of poets, who were deceived by its enchanting beauty and breathtaking scenery, through it they depicted the reality of the life they live, and the things that involved them, as well as showing their personal culture, and the joys of life that experience, articulating this with a descriptive and analytical study, focusing on how the poet portrayed the visual scene, in an important stage of Arabic literature in Egypt.

View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Pakistan Entomologist
Taxonomic and molecular study of the widow spider genus Latrodectus Walckenaer, 1805 (Araneae: Theridiidae) in Iraq
...Show More Authors

The genus Latrodectus Walckenaer, 1805 (Araneae: Theridiidae) is a worldwide distribute genus (Graudins et al., 2001), it includes a group of species commonly referred to as widow spiders. It's considered a taxonomically complex genus as the status of several forms had not been properly evaluated and specific boundaries are not well defined or understood (Levi, 1959; 1967; Garb et al., 2001), therefore, in multiple cases, populations has been uncritically referred to as different taxa. Discriminating between Latrodectus species using morphology has always been problematic (Levi, 1983), it is difficult taxonomically and readily separated from members of other Theridiid genera (Mirshamsi, 2005). The Genus Asagena Sundevall, 1833 was revalidat

... Show More
Publication Date
Sun Jun 20 2021
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
FIRST RECORD OF OPILIO KAKUNINI SNEGOVAYA, COKENDOLPHER & MOZAFFARIAN, 2018 (ARACHNIDA, OPILIONES, PHALANGIIDAE) FROM IRAQ
...Show More Authors

The species of Opilio kakunini Snegovaya, Cokendolpher & Mozaffarian, 2018 was recorded for the first time in Iraq; as well as to four species belonging to this order which were recorded previously. In this paper, we added a new species to the checklist of Iraqi opilionid fauna with a description of the most important characteristics, along with genitalia, for both males and females are presented with digital photographs. Specimens of males and females were collected from Al- Rifai district northern of Dhi-Qar Province, southern of Iraq.
 

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 10 2012
Journal Name
Iraqi Journal Of Science
THE IMPACT OF DISEASE AND HARVESTING ON THE DYNAMICAL BEHAVIOR OF PREY PREDATOR MODEL
...Show More Authors

In this paper, a harvested prey-predator model involving infectious disease in prey is considered. The existence, uniqueness and boundedness of the solution are discussed. The stability analysis of all possible equilibrium points are carried out. The persistence conditions of the system are established. The behavior of the system is simulated and bifurcation diagrams are obtained for different parameters. The results show that the existence of disease and harvesting can give rise to multiple attractors, including chaos, with variations in critical parameters.

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Proceedings Of The 2020 2nd International Conference On Sustainable Manufacturing, Materials And Technologies
The food web prey-predator model with toxin
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Revis Bionatura
Description and determination of the nanocellulose components produced from acetic acid bacteria
...Show More Authors

Some microorganisms can produce nanocellulose, which is known as bacterial nanocellulose (BNC); the most active bacterial producer is acetic acid bacteria (AAB), which is a gram-negative, motile and obligate aerobic belongs to the family Acetobacteraceae. Bacterial nanocellulose has excellent attention in medical (surgical domain), industrial and pharmaceutical fields because of its flexible properties, characteristics and advantages. So, in this study, the AAB (5AC) isolate was isolated from apple vinegar. The production of BNC was performed by using a natural medium called palm dates liquid medium, the produced bacterial Cellulose was purified by using the sodium hydroxide method; it was observed that the wet weight of the BNC was a

... Show More
Scopus (1)
Scopus
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Proposed Method For Web Services Security
...Show More Authors

TI1e Web service securi ty challenge is to understand  and  assess the risk  involved  in securing  a web-based  service  today, based on our existing security technology, and at the same time tmck emerging standards and  understand  how they will be used  to offset the risk in

new web services. Any  security model must  i llustrate  how data  can

now  through   an  application   and   network   topology  to  meet  the

requirements  defined  by the busi ness  wi thout exposing  the data  to undue  risk.  In this paper  we propose &n

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
New Iterative Method for Solving Nonlinear Equations
...Show More Authors

The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.

View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More