: The terrestrial snail Eobania vermiculata (O. F. Müller, 1774) were collected from three station in Baghdad Al- Karkh, Iraq between the period from June 2016 to July 2017. Then we studied the life cycle from the egg to maturity. We studied and photographed the external morphology of it’s shell to identified the species. This species was recorded for the first time in Baghdad.
We report the detail characterizations and
In This research a Spectroscopic complement and Thermodynamic properties for molecule PO2 were studied . That included a calculation of potential energy . From the curve of total energy for molecule at equilibrium distance , for bond (P-O), the degenerated of bond energy was (4.332eV) instate of the vibration modes of ( PO2 ) molecule and frequency that was found active in IR spectra because variable inpolarization and dipole moment for molecule. Also we calculate some thermodynamic parameters of ( PO2 ) such as heat of formation , enthalpy , heat Of capacity , entropy and gibb's free energy Were ( -54.16 kcal/mol , 2366.45 kcal/mol , 10.06 kcal /k/mol , 59.52 k
... Show MoreThe present work deals with five species of parasitic Hymenoptera belonging to Pteromalidae, Eupelmidae and Eurytornidae which have been reared from brachid beetles. A new species, Eurytoma irakensis is described and the species, Bruchocida orientalis Crawford is recorded for the first time from Iraq.
The aims of this study to diagnose the role of the (relationship and impact) Academic driving practices dimensions (model the way, inspire a shared vision, challenge the process, enable others to act, encourage the heart ) in the activation of human capital (investment and development) for (knowledge, skills, expertise, creative and training capabilities) in a sample of university professors in Baghdad city(Baghdad University, Al Mustansiriya University, University of Technology). (367 )samples were distributed to (232 at the University of Baghdad, 97 at Al-Mustansiriya University and 38 at the University of Technology). The goals of descriptive analytical method research have been used, questionnaire has been a main tool for dat
... Show MoreThis Study was conducted to investigate vaginitis in women who live in Baghdad City. Results Revealed that Candida spp. were the causal agent of 38.5% of symptomatic cases the yeasts Candidaalbicans, C.glabrata, C.tropicalis, C.parapsilosis and C.krusei were isolated with the percentage of 38.1, 9.1, 3.9, 2.6, 1.3 respectively also there were 18% of women in control group carrying Candida spp. The direct smear method were not efficient because the percentage of infection was 17.5% comparing with the culture method the sensitivity of direct smear method was 45.5% The percentage of WBC to Epithelial cells was less than one in 76.6% of women.
The main objective of resources management is to supply and support the site operation with necessary resources in a way to achieve the required timing in handing over the work as well as to achieve the cost-realism within the budget estimated. The research aims to know the advantage of using GIS in management of resources as one of the new tools that keep pace with the evolution in various countries around the world also collect the vast amount of spatial data resources in one environment easily to handled and accessed quickly and this help to make the right decision regarding management of resources in various construction projects. The process of using GIS in the management and identification of resources is of extreme importance in t
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.