This work deals with the reporting of four helminthes in the rook partridge Alectoris graeca collected in G'ara area west of Iraq. The infection rates of the cestodes, Raillietina alectori and R. tetragona and the nematode. Hartertia gallinarum, and the trematode. Postharmostomum gallinum were 6.38%, 40.43%, 10.63%, and 10.63% respectively. The host relationships were discussed.
This study was conducted on a sample of commercial banks in Iraq, chosen according number of considerations for twenty banks, contained two public banks and eighteen private banks. &
... Show MoreInvestigating the heavy metals in soil is important to the life of humans and living organisms. Diyala River Lower Reaches was chosen due to the changes in environmental characteristics that took place in recent years. Twelve sediment samples were collected from four different sites. The physical, and chemical properties and the concentrations of nine heavy metals were indicated. The results showed that the average concentrations of arsenic, copper, chromium, cobalt, iron, manganese, nickel, lead, and zinc are 8.5, 45.7, 538.5, 12.2, 5.07, 991.7, 183.5, 16.07, 136.5 ppm, respectively. They reflect contamination with arsenic, chromium, and nickel, while they are free of lead, and zinc contamination, according to the Environmental Pro
... Show MoreTrials were carried out in the middle of Iraq ( 3 different sites ) during 2009 to detecation and determined the seasonal occurrence of Agriotes lineatus L. Three YATOR funnel traps were used in each of these sites which baited with the specific pheromone of A. lineatus from the first of March to the end of October in the College of Agriculture - Abu- Ghraib / Provenance of Baghdad and AL-Nile / Provenance of Babylon , while in AL-Radhwania was used through May- June. Pheromone dispenser were changed every 6 weeks in each of these traps . Males of A. lineatus were found in all of the three sites , and the total number capture were 208 , 897 and 57 male / 3 traps / season in College of Agriculture , AL-Nile and AL-Radhwania respectiv
... Show MoreIn our research, several different Statics solutions have been implemented in the processing of seismic data in the south of Iraq for (2D) line seismic survey (AK18) of Abu-khama project with length 32.4 Km and their corresponding results have been compared in order to find optimum static solutions. The static solutions based on the tomographic-principle or combining the low frequency components of field statics with high frequency ones of refraction statics can provide a reasonable static solution for seismic data in the south of Iraq. The quality of data was bad and unclear in the seismic signal, but after applying field statics there is an enhancement of data quality. The Residual static correction improved the qualities of seis
... Show MoreThe major objective of this paper is to recognize the flow units of Yamama Formation in the west Qurna oil field, south of Iraq. To attain this objective, four wells namely, WQ-23, WQ-148, WQ-60, and WQ-203 are selected and analyzed. The two techniques hat proposed by some scientists to identify flow units are tested and verified. Results are also enhanced using well logs interpretation and the flow areas are proposed through the studying of the behavior of different well logs. Results of applying the two proposed techniques identify six flow reservoir units for the wells WQ-23, WQ-148, WQ-60, and WQ-203, respectively. This study also shows that the flow reservoir properties in the Yamama Formation improved towards the northeast of the W
... Show MoreRecord, verify, and showcase your peer review contributions in a format you can include in job and funding applications (without breaking reviewer anonymity).
One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show MoreIn this work, there will be upgraded on the work of (Mahmood and Mahmood , 2018) by finding a general rule of the code for any text made from any number of words by using James e-Abacus Diagram in partition theory