Rivers Tigris and Euphrates, as well as the wetlands in southern Iraq and the Diyala River, were all included in the evaluation of earlier studies on the variety and factors impacting fish in Iraqi waters. Different studies documented different types, and the number of species recorded varied between the studies, which could be explained by the registration of some species, synonyms, differs from the registration of some species with synonymous names By mistake, as well as recording new species in times that followed some previous studies, Also, the difference in some factors, including the pollution of some waterways, leads to a difference in the existing species, so we find the presence of species that are tolerant of pollution. There are different factors that determine the diversity of different types of fish. Temperatures, water salinity, electrical conductivity, organic materials, nutrients represented by nitrates and phosphates, in addition to ammonia are all factors that determine the types of fish present in the environment, It is these different taxes Poeciliidae, Mugilidae, Sparidae, , Hemiramphidae, , Siluridae , Engraulidae, Mastacembelidae Some marine species also exist Liza subviridis, Hyporhamphus limbatus, Thryssa whiteheadi, Acanthopagrus arabicus
A Multiple System Biometric System Based on ECG Data
In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreThis research investigates new glasses which are best suitable for design of optical systems
working in the infrared region between 1.01 to 2.3μm. This work is extended to Oliva & Gennari
(1995,1998) research in which they found that the best known achromatic pairs are (BAF2-IRG2; SRF2-
IRG3; BAF2-IRG7; CAF2-IRGN6; BAF2-SF56A and BAF2-SF6). Schott will most probably stop the
production of these very little used and commercially uninteresting IRG glasses. In this work equally
good performances can be obtained by coupling BAF2, SRF2&CAF2 with standard glasses from Schott
or Ohara Company. The best new achromatic pairs found are (SRF2-S-TIH10; CAF2-S-LAL9; CAF2-SLAL13
and CAF2-S-BAH27). These new achromatic pai
The idea of digital legacy is a very modern issue in the legal reality, as it did not appear until this decade, and the signs of its emergence in America are originating from Iraq by an American soldier who was killed in Iraq. The legal position of the accounts and pages and the content of the accounts and personal pages left by the human being after his death, and can it be passed on after him to the heirs or not? It is the general successor who deserves this digital stuff.
When reviewing the position of comparative laws of American, English, French, Iraqi and Islamic jurisprudence, we find that the essence of the problem raised by the issue of digital heritage is the collis
... Show MoreThe administrative authority (the administration) exercises its activity or work through two forms of business. This administrative act in which the intention of the administrative authority (the administration) is to have a specific legal effect. The risk, and whether the administration is restricted or discretionary in exercising its authority in the licensing area, it must not deviate from the legitimacy framework.
Accordingly, and to be informed of this, we divide our study into three sections, in the first of which we deal with the definition of administrative licenses, and in the second of it we explain the competent authority for administrative licenses in comparative law, and in the third we highlight the authority concer
... Show MorePresentation of urinary calculus ranges from painful urination to acute retention. Diagnosed by x-ray pelvis and non-contrast CT and removal of stone by various methods is the management. Variety in symptoms, sometimes make clinical diagnosis difficult until radiological investigations confirm it. In this case presentation, initial diagnosis was made of Urethrocutaneous fistula may be due to distal stricture, but on investigating, he was diagnosed as urethral calculus in urethral diverticulum , as the reason for his symptoms
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More