Environmental factors that damage plant cells by dehydrating them, such cold, drought, and high salinity, are the most common environmental stresses that have an impact on plant growth, development, and productivity in cultivated regions around the world. Several types of plants have several drought, salinity, and cold inducible genes that make them tolerant to environmental challenges. The purpose of this study was to investigate several species in
The discus throwing event is one of the complex events in athletics, and it is characterized by a performance method that depends on the principle of mechanical moments and requires high explosive capabilities of the thrower in addition to some physical specifications,which depends effectively and effectively on the biomechanical aspects in generating large moments during rotation. The importance of the research is highlighted by the interest in athletics, especially the effectiveness of the discus throw and the continuation of its development process, the importance of kinetic analysis in revealing the most important weaknesses and strengths of shooters, and the importance of explosive power And the moments generated in the rotation of the
... Show MoreThe aim of the research to highlight the calendar of the most important tools used by the Central Bank of Iraq, in the implementation of the function of supervisory oversight, to verify the stability of the banking system, and protect the funds of shareholders, and depositors in general and the absence of any raises the risks of default and financial failure in particular, for commercial banks. The most important flaws and weaknesses in these tools, in the early detection of the risks of continuity in a timely manner, The study concluded a set of conclusions, including the weakness of the tools used in the performance of the function of supervisory oversight in detecting cases of default and financial failure in the early time as well as
... Show MoreThe Bouguer gravity and magnetic RTP anomalies data were used to detect the main tectonic boundaries of middle and south of Diyala Province, east Iraq. Window method was used to separate the residual anomalies using different space windows for the Bouguer and Magnetic RTP maps. The residual anomaly processed in order to reduce noise and give a more comprehensive vision about subsurface lineaments structures. Results for descriptive interpretation presented as contour maps in order to locate directions and extensions of lineaments feature which may interpret as faults. The gradient technique is used for depth estimation of some gravity source which shows that the sources depth range between (13.65
... Show MoreThe 2D imaging survey was conducted across an unknown K- 3 cavity that is located in Haditha area-Western Iraq.2D measurements are collected along two intercrossing traverses above the cavity with 105m length of each one. Dipole-dipole array is performed with n-factor of 6 and a-spacing equals to 5m. The inverse models of 2D imaging technique showed clearly that the resistivity contrast between the anomalous part of cavity and background resistivity of rocks is about 800:100 Ωm .In addition, the invers models showed that the depth from ground surface to the upper roof of cavity approximately equals to 11m near the cavity operator. So, the K-3 cavity is well defined from 2D imaging with Dipole –dipole array in comparison with the actua
... Show MoreA 3D velocity model was created by using stacking velocity of 9 seismic lines and average velocity of 6 wells drilled in Iraq. The model was achieved by creating a time model to 25 surfaces with an interval time between each two successive surfaces of about 100 msec. The summation time of all surfaces reached about 2400 msec, that was adopted according to West Kifl-1 well, which penetrated to a depth of 6000 m, representing the deepest well in the study area. The seismic lines and well data were converted to build a 3D cube time model and the velocity was spread on the model. The seismic inversion modeling of the elastic properties of the horizon and well data was applied to achieve a corrected veloci
... Show MoreThe child realize that the meals time provide golden opportunities to get the attention the child needs. However, many difficulties that may appear about eating food can be avoided, if the family used the right way in dealing with this problem. The study aims, in this case, at searching for the reasons that lies behind the child's obstinacy in eating his food and the attempt to study some variables that is related to the research topic.
The results are summed up as follows:
- The number of the sample children is 3 of both sexes between the ages of 3 to 6 years
The national educational systems both in the Russian Federation and Iraq Republic have to adjust the training programs to duly prepare the pedagogical university students for the modern challenges and situations on the market of educational services. For success of the service, the education specialists have to fully mobilize their physical, mental and emotional resources and persistently advance their skills and knowledge using the relevant online education courses; practical research conferences; persistent self-education to master theoretical fundamentals of the modern physical education and sport service; and be active in trainings and competitions in their vocational individual game sports including badminton, table tennis and tennis.
... Show MoreComparative cytogenetic studies were carried out on males of two species of flour beetles, Rust flour beetle Tribolium castaneum and Confused flour beetle Tribolium confusum to investigate the karyotype. In these species, somatic chromosomes were arranged according to its length except the sex chromosomes. Results of this study showed that complete chromosomes karyotyping (2n) of T.castaneum equaled to twenty chromosomes ( 2n=20, XY ) whereas (2n) T.confusum equaled eighteen chromosomes ( 2n= 18,XY). In the two species the sex chromosome Y was the shortest chromosome and had length of average ± standard error in T.castaneum equaled to 1.500 ± 0.0 µm whereas
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More