The study includes the phytoplankton compositions in Alaaras Lake , in summer 2008 and winter , spring , summer 2009. Samples were collected from three selected sites at north , middle and south of lake. A total of 74 taxa of phytoplankton were identified . The diatoms were the dominated by 44 taxa represented 82.8% of the total indentified species, followed by green algae ( Chlorophyta ) of 20 taxa (8.5%), and blue green algae (Cyanophyta of 7 taxa (7.2%). Tow species were recorded of Pyrrophyta and one species of Euglenophyta .The seasonal variation for Diatoms density showed tow peaks during Autumn and summer. Few species were dominated during the most studied period such as Cocconeis placentula var. euglypta, Synedra fasciculata and Cymbell affinis .
Colorectal cancer CRC is the third most commonly diagnosed cancer in males and the second in female, so it is a common and life-threatening disease serum of 48 males and 40 females suffering from CRC disease as group one (G1) without taking a chemotherapy dose, the same patients group tow (G2) after taking the first chemotherapy dose, while group three (G3) whose patients in (G1) and (G2) after second taking a chemotherapy dose. and group four (G4) consist of (30 males and 30 females) healthy Iraqi control. Results showed a significant increase in IL-17, IL-17RA and CEA in G1, while there was a significant decrease in vitamin D concentration in G1 than other groups, also there was positive (+ ve) significant correlation between IL-17 and CE
... Show MoreBackground: Toxin-producing Shiga Escherichia coli has been identified as a new foodborne pathogen that poses a significant health risk to humans. Shiga toxin-producing Escherichia coli can be found in raw cow milk and its derivatives. A small number of Escherichia coli strains that produce shiga toxin are pathogenic. Aim of study: The study aimed to see if there were any virulence genes in 50 milk samples that were typical of Entero-haemorrhagic E. coli and evaluate the Myrtus communis effects on these bacteria. Materials and Method: Milk samples were used to isolate E. coli bacteria (n= 27), biochemically analyzed, and genetically screened for virulence genes using a multiplex (PCR). The hydro-alcoholic extraction of Myrtus communis leave
... Show MoreThis work deals with the description of histopathological effects of the nematode Hartertia
gallinarurn Theiler. 1919 on the digestive system of the seesee partridge collected from Qa’ra
area in the western desert district of Iraq. along with some notes on intensity fluctuation of the
parasite according to the seasons. It is found that the major effects of the nematode are
necrosis and fibrosis of gizzard: granulomatous reaction. necrosis and mononuclear
infiltration of proventriculus: damage of mucosal lining of intestine and lymphocytic
infiltration of liver.
Decision-makers in each country work to define a list of internal and external interests, goals and threats to their countries according to the nature of their awareness of these interests, goals and threats.
Hence, Iraq is not an exception to this rule, and the process of evaluating its interests and the objectives of its foreign policy is subject to the pattern of awareness of decision-makers and the influencing forces in defining its basic interests, which often witness some kind of difference in defining them, evaluating their importance and determining the size of the threats they face. And among these interests and threats that have witnessed a difference in the assessment of their
... Show MoreThis article describes how to predict different types of multiple reflections in pre-track seismic data. The characteristics of multiple reflections can be expressed as a combination of the characteristics of primary reflections. Multiple velocities always come in lower magnitude than the primaries, this is the base for separating them during Normal Move Out correction. The muting procedure is applied in Time-Velocity analysis domain. Semblance plot is used to diagnose multiples availability and judgment for muting dimensions. This processing procedure is used to eliminate internal multiples from real 2D seismic data from southern Iraq in two stages. The first is conventional Normal Move Out correction and velocity auto picking and
... Show More
This research worked on identifying the effect of increasing the volume of indebtedness by companies listed on the Iraq Stock Exchange on the trading volume of those companies, and this research included some theoretical concepts related to both debt financing and trading volume, and it represents the research community of the joint-stock companies listed in The Iraq Stock Exchange (the banking sector). As for the research sample, it was deliberately chosen represented by companies with continuous trading without stopping, which reached 10 joint-stock companies, and the period of research was extended during the period 2011-2015, and a set of indicators and financial methods were used In measuring research v
... Show MoreA total of 54 abu mullet Planiliza abu (Heckel, 1843) were collected from two stations (north and south stations) along the Euphrates River near Samawa City, Al-Muthanna province and were examined during the period from October 2016 till September 2017 for parasites. Six out of 35 examined fishes from the north station (17.1%) and one out of 19 examined fishes (5.3%) from south station were infected with the microcotylid Solostamenides paucitesticulatus Kritsky & Öktener, 2015. The parasite was illustrated and described, and it is considered as a new record for the parasitic fauna of fishes of Iraq.
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More