A total of 60 species of aquatic oligochaetes were identified in different sites within Tigris-Euphrates basin / Iraq, including River Tigris, River Euphrates, Southern marshes ( Al-Haweiza , Al-Hammar and Al-Chebaiesh ) , Shutt Al-Germa, and Shatt Al-Arab. In River Euphrates 39 species were identified, 40 species from River Tigris and 32 species from Shatt-Al-Arab and southern marshes.The identified species were classified as four species of Family Aeolosomatidae, 54 species of Naididae ( 31 Naidinae , 8 Pristininae and 15 Tubificid worms), one species of each of Lumbriculidae ( Lumbriculus variegates ) and Lumbricidae ( Eiseiella tetraedra). Among Aeolosomatidae , Aelosoma aquaternarium, A. Liedyi, A. variegatum and A. hemprichi
... Show MoreThe current study included the collection of soft samples for Ipomoea carnea Jacq. The anatomical properties of the leaf, which included the characteristics of the surface epidermis, the vertical section of the leaf, the transverse section of the petiole, the pedicel and the indumentum, as well as the study of leaf venation, were examined
The soil acari fauna of Citrus orchards of Baghdad in Jadiriya area was studied in a total
of forty-eight samples. Twenty-two species were recorded during the present study of which
eight species were first records to Iraq. The ordinal composition of the soil acari fauna was
predominantly Mesostigmata.
This fauna represents diverse trophic groups. The most abundant groups were the
predacious and the Microphytophagus, while the less abundant groups were the predacious/
Microphytophagus, Macrophytophagus, and Panaphytophagus. The most abundant and
frequent species were Rhizoglyphus sp. Tyrophagus putrescentiea (Scrank), Pachylaelaps
longisetis Halbt. and Stratiolaelaps miles Berl.
Comparative taxonomic study has been compeleted for the species of the. genus Centaurium Hill. of Iraq. So the morphological characters were studied comparatively for the first time form Iraqi materials. Stems, leaves ,infloresences and reproductive organs characters were a good taxonomic importance. Geographical distrtribution has been done for the species of the genus in addition to the environment information. The results were presented with schedules, tables, maps and micrographs. Taxonomic key for the species separation was also presented.
This study is concerned with a survey of seven species belonging to seven genera under two families and two orders found in some different areas of the Tigris River, especially since these areas have not been surveyed for a long time, and an attempt to identify the existing species at the present time after the recent water scarcity of the Tigris and Euphrates rivers and all water bodies interior of Iraq and the impact of this scarcity on the fish diversity found in some areas of the Tigris River in Baghdad.
Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreThe information revolution، the new language has become one for all the peoples of the world through handling and exchange and to participate in all key areas (economic، cultural and scientific) and Accounting episode of this revolution has turned most of the traditional systems (manual) in companies to automated systems، this transformation in the regulations summoned from the auditors that develops their traditional examination automated systems so had to provide tools for auditing help auditors to keep abreast of developments and as a result there is no evidence checksum Local Private audited automated systems came search to provide evidence helps auditors for guidance as part of COBIT، which provides audit procedures Detailed inf
... Show More