Comparative taxonomic study has been compeleted for the species of the. genus Centaurium Hill. of Iraq. So the morphological characters were studied comparatively for the first time form Iraqi materials. Stems, leaves ,infloresences and reproductive organs characters were a good taxonomic importance. Geographical distrtribution has been done for the species of the genus in addition to the environment information. The results were presented with schedules, tables, maps and micrographs. Taxonomic key for the species separation was also presented.
African countries are among the countries in the world that suffer from the phenomenon of child recruitment in wars and conflicts. There are many reasons behind it, including the nature of the human formation of children, the societal violence to which they are exposed, lack of access to education, economic hardships, as well as the role of African wars and conflicts and other reasons that compelled children to join armed groups and participate in military operations. The recruitment of children is divided into two types, compulsory and voluntary, and this leads to many humanitarian and security repercussions that are not limited to a specific period of time but extend to subsequent generations, and due to its seriousness, t
... Show MoreThis study is at the heart of the pragmatic theory, as this research seeks to highlight the concept of necessity, and what the researchers have tended to do is that the development that has acquired integrated pragmatics is only for the development of the subject of necessity, as it is one of the contents of the saying, and this is what made Decroux define it as the semantic element that Concerning the saying, as for Grace; He paid great attention to the conversational imperative, and understood the requirement by clues or suggestions, as it is an element known for its absence and presence in the linguistic structures included in the text when reading or when understanding. This study has paved the way for clarifying the concept of necessi
... Show MoreIn this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.
We can understand interior design as a series of interconnected human principles and goals formed by science and knowledge to build a human product that reveals or gives meaning to things، and this can be presented through ecology as a system concerned with environmental aspects and as part of interior design، seeking to achieve aesthetic and functional values، in an interactive form between spaces The interior and its occupants are within an environmental balance full of life، and the ecological interior design attaches great importance to the embodiment of spiritual aspects in the internal environment، in addition to emphasizing the importance of protecting the environment and preserving resources through saving in its use and usi
... Show MoreIn this paper, we present a study of examples of writings that are known in the science of Semitic research compared to the texts (Jewish-Arab, Samaritan-Arabic) written in Hebrew script and texts from the Bible. We try to explain the role of these literary works in Islamic history and civilization, as one of the most important documents are the writings (Gniza), which contributed to provide a full presentation on life in the Islamic community in all aspects of life, especially religious activity and showed the sincere relationship in dealing with the other under tolerance The University of Cambridge has prepared Islamic documents and kept them in separate boxes and presented them to researchers to convey the Islamic heritage written by
... Show MoreThe research dealt with the concepts of the philosophy of values and its epistemological variables according to specific propositions represented in their scientific approaches to value theory in the field of industrial design. As the epistemological propositions of the theory of values were dealt with based on the epistemological fields that dealt with the concept and what values are, starting with the modernist propositions and postmodern, passing through the propositions of sociological and psychological thought, which was a prelude to extracting the concepts of value theory and adopting it in the field of industrial product design. The epistemological approaches to value theory in industrial product design were repr
... Show MoreThree isolated bacteria were examined to remove heavy metals from the industrial wastewater of the Diala State Company of Electrical Industries, Diyala-Iraq. The isolated bacteria were identified as Pseudomonas aeruginosa, Escherichia coli and Sulfate Reducing Bacteria (SRB). The three isolates were used as an adsorption factor for different concentrations of Lead and Copper (100, 150, and 200 ppm.), in order to examine the adsorption efficiency of these isolates. In addition, the effect of three factors on heavy metals adsorption were examined; temperature (25, 30, and 37 ?C), pH (3 and 4.5) and contact time (2 and 24 hrs). The results showed that the highest level of lead adsorption was obtained at 37 ?C by E. coli, P, aerugenosa and
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreMaximum values of one particle radial electronic density distribution has been calculated by using Hartree-Fock (HF)wave function with data published by[A. Sarsa et al. Atomic Data and Nuclear Data Tables 88 (2004) 163–202] for K and L shells for some Be-like ions. The Results confirm that there is a linear behavior restricted the increasing of maximum points of one particle radial electronic density distribution for K and L shells throughout some Be-like ions. This linear behavior can be described by using the nth term formula of arithmetic sequence, that can be used to calculate the maximum radial electronic density distribution for any ion within Be like ions for Z<20.