The Life Cycle and Larval Development of Neoechinorhynchus iraqensis (Acanthocephala: Neoechinorhynchidae) in the Intermediate Host
The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show MoreObjective: This project aimed to study the morphological description and histological structure of ileum in Iraqi black partridge (
The effective application of the method of measuring and evaluating performance according to the Balanced Scorecard the need for an information system a comprehensive and integrated for internal and external environment, Which requires the need to develop accounting information system in general and cost management information systems to suit the particular requirements of the environment in terms of the development of modern methods of measurement to include the use of some methods that have proven effective in measuring and evaluating performance.
The research problem in need of management to develop methods of measuring and evaluating performance through the use of both financial measures and non
... Show MoreFor the first time, the life cycle of Neoechinorhynchus iraqensis, a parasite of Liza abu and other freshwater fishes in Iraq and its larval development in the intermediate host, the copepod Cyclops hyalinus was given. Hatching took place in the intestine of the copepod host within 10 minutes of exposure to the infective eggs. Motile acanthor penetrated the wall of the intestine within 2-4 hr. after exposure and was found free in the hemocoel where it metamorphoses through the acanthella stage. Acanthella stage revealed changes in the entoblast where the anterior section gave rise to brain, proboscis and proboscis receptacle. The posterior section differentiation gave rise to the genital system. By 12 days, development in the copep
... Show MoreThis study aims to isolate the pathogenic yeasts from genital tract and investigate their relationship with the age .The results clarified that the most pathogenic yeast isolated from genital tract was Candida albicans , also the results of C.albicanas isolates susceptibility test, to different antifungal revealed that they were sensitive to Miconazole, Ketoconazole and Clotrimazol and were resistant to Nystatin and Grisofulvin. The study of relationship of vaginal infection with the age showed that the incidence of infection with Candida was high among females age group (19-39 years).
Knowledge management contribute to the overall private university libraries to develop libraries for the purpose of creating human and technological resources by investing research and development, as well as education and training for life.
This study followed the methodology of the descriptive and historical pillars of knowledge management for the years 1990 to the present day in 2017, depending on statistical figures obtained by the researchers from the General Secretariat of the Central Library at the University of Baghdad, and the Human Resources Division, which specialized human resources training after 2004 (and before those years from 1982 until 2002, where the continuing education was committee of the fixed committees are wor
The current research aims at testing the relationship between organizational immunity and preventing administrative and financial corruption (AFC) in Iraq. The Statistical Package for the Social Sciences program (R& SPSS) was used to analyse the associated questionnaire data. The research problem has examined how to activate the functions of the organizational immune system to enable it to face organizational risks, attempt to prevent administrative and financial corruption, and access the mechanisms by which to develop organizational immunity. A sample of 161 individuals was taken who worked in the Directorate General of Education, Karbala. Also, it was concluded to a lack of memory function for organizational immunity. In a
... Show MoreThis research is a new reading of some of the words in the Holy Quran, which is very old. It is a human reading in which religions are intertwined by recognizing the relationship between man and his fellow man in the unity of existence and the unity of the source of religions and the unity of language. The importance of this research in comparing some of the Arabic words has been contained among books believed by followers that it is from the one God Sunday.
When words are spoken in one way in the form of one creature, from the beginning of creation to the present day, this indicates the single origin of the languages..
The research tools were books of heavenly religions, the Quran, dictionaries and interpretations.
... Show More