Comparative taxonomic study has been compeleted for the species of the. genus Centaurium Hill. of Iraq. So the morphological characters were studied comparatively for the first time form Iraqi materials. Stems, leaves ,infloresences and reproductive organs characters were a good taxonomic importance. Geographical distrtribution has been done for the species of the genus in addition to the environment information. The results were presented with schedules, tables, maps and micrographs. Taxonomic key for the species separation was also presented.
ABSTRACT Fifty extremely halophilic bacteria were isolated from local high salient soils named Al-Massab Al-Aam in south of iraq and were identified by using numerical taxonomy. Fourty strains were belong to the genus Halobacterium which included Hb. halobium (10%). Hb. salinarium (12.5%), Hb.cutirubrum (17.5%), Hb-saccharovorum (12.5%), Hb. valismortis (10%) and Hb. volcanii (37.5%). Growth curves were determined. Generation time (hr) in complex media and logarithmic phase were measured and found to be 10.37±0.59 for Hb. salinarium. 6.49 ± 0.24 for Hb.cutirubrum. 6.70±0.48 for Hb-valismonis, and 11.24 ± 0.96 for Hb. volcanii
Adhrt all fungal biological control ability Tdhadah less than 2 repel Alaftran Almamradan showed leaky mushroom Biological control is thermally laboratories and different concentrations of 5, 10 and 20% inhibition in the growth of fungus colonies amounted to 3.8 cm and 3.1 and 2.4 respectively in comparison with control 9 cm
In this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.
In this paper, the Azzallini’s method used to find a weighted distribution derived from the standard Pareto distribution of type I (SPDTI) by inserting the shape parameter (θ) resulting from the above method to cover the period (0, 1] which was neglected by the standard distribution. Thus, the proposed distribution is a modification to the Pareto distribution of the first type, where the probability of the random variable lies within the period The properties of the modified weighted Pareto distribution of the type I (MWPDTI) as the probability density function ,cumulative distribution function, Reliability function , Moment and the hazard function are found. The behaviour of probability density function for MWPDTI distrib
... Show MoreThe research presents the reliability. It is defined as the probability of accomplishing any part of the system within a specified time and under the same circumstances. On the theoretical side, the reliability, the reliability function, and the cumulative function of failure are studied within the one-parameter Raleigh distribution. This research aims to discover many factors that are missed the reliability evaluation which causes constant interruptions of the machines in addition to the problems of data. The problem of the research is that there are many methods for estimating the reliability function but no one has suitable qualifications for most of these methods in the data such
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreAbstract
The concept of unipolar has allowed the united states of America to
control the rest of the internations community units through the rxclusively of
control in international affairs without enabling other countries who have the
ability to compete with it to appear this comes as a result of it's position to all
kinds of powers like military, economic and technical powers that enable it to
continue dominating other countries, this superior control enabled it to be the
(hyper power) on the international political scene so that it allowed it to
exercise and implement the policy of domination against all this appeared
after its empire superiority became clear, in a unique way that have never
been known in
This research aims to study the impact of strategic information systems on the development of intellectual capital in the Public Shareholding Electricity Distribution Company in the Hashemite Kingdom of Jordan. To achieve the objectives of the study, a questionnaire was developed for the purpose of data collection, as the number of valid questionnaires for analysis was about (135), and SPSS and AMOS 0.26 software was used to analyze the collected data. The study found out that the respondents' perceptions of the level of importance of strategic information systems and the level of importance of intellectual capital were high, and that the relational capital has ranked as first, followed by structural capital, and h
... Show MoreIn this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.