A taxonomic keys was established of book and bark lice Order Psocoptera to isolated insects in Iraq from different localities of Baghdad and Babylon provinces. Thirteen species belong to eight genera and five families have been studied and described in details, these species were recorded for the first time in Iraq. These species are: Belaphopsocus badonneli New, 1971; Belaphotroctes oculeris Bodonnel, 1973; Embodopsocosis newi Bodonnel, 1973; Epipsocus stigamaticus Mockeord, 1991; Lepinotus huoni Schmidt and New, 2008; Liposcelies decolor Peramane 1925 Liposcelies paeta Pearman 1942 Liposclies bostrychphila Badonnel 1931; Liposclies brunnea Mostchulsky 1852; Liposclies entoophila Enderlein 1907; Neopsocopsis minuscule Li 2002 ; Nonapsocus oceanicus Pearman 1928.; Identification key to suborders, families, genera and species were designed according to differences of morphological characters. Adults were described in details and all body parts were pictured and some of them drawn by Camera Lucid
Traditionally, path selection within routing is formulated as a shortest path optimization problem. The objective function for optimization could be any one variety of parameters such as number of hops, delay, cost...etc. The problem of least cost delay constraint routing is studied in this paper since delay constraint is very common requirement of many multimedia applications and cost minimization captures the need to
distribute the network. So an iterative algorithm is proposed in this paper to solve this problem. It is appeared from the results of applying this algorithm that it gave the optimal path (optimal solution) from among multiple feasible paths (feasible solutions).
This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreThe present work aims to study the effect of using an automatic thresholding technique to convert the features edges of the images to binary images in order to split the object from its background, where the features edges of the sampled images obtained from first-order edge detection operators (Roberts, Prewitt and Sobel) and second-order edge detection operators (Laplacian operators). The optimum automatic threshold are calculated using fast Otsu method. The study is applied on a personal image (Roben) and a satellite image to study the compatibility of this procedure with two different kinds of images. The obtained results are discussed.
Background: Avascular necrosis (AVN) is defined as cellular death of bone components due to interruption of the blood supply; the bone structures then collapse, resulting in bone destruction, pain, and loss of joint function. AVN is associated with numerous conditions and usually involves the epiphysis of long bones, such as the femoral head. In clinical practice, AVN is most commonly encountered in the hip. Early diagnosis and appropriate intervention can delay the need for joint replacement. However, most patients present late in the disease course. Without treatment, the process is almost always progressive, leading to joint destruction within 5 years.Treatment of a vascular necrosis depends mainly on early diagnosis which mainly base
... Show MoreUnderstanding breaking news necessitates a special attention, since they are written with a special style. The study aims at identifying the difficulties faced by the Iraqi university EFL learners in comprehending English breaking news. The study included 10 fourth year students enrolled at the Department of English, College of Education for Humanities, University of Anbar. Thus, a questionnaire as a research instrument, was sent online to the students. The questionnaire points were related to the identification of difficulties faced by the learners in comprehending English breaking news. The data of the study were (10) headlines selected purposively from Euronews website. The data were qualitatively analyzed based on quantifying the qua
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreMethicillin resistant Staphylococcus aureus (MRSA) is one of the principal nosocomial causative agents. This bacterium has the capability to resist wide range of antibiotics and it is responsible for many diseases like skin, nose and wounds infection. In this study, randomly amplified polymorphic DNA (RAPD)-PCR was applied with ten random primers to examine the molecular diversity among methicillin resistant Staphylococcus aureus (MRSA) isolates in the hospitals and to investigate the genetic distance between them. 90 Isolates were collected from clinical specimens from Iraqi hospitals for a total of 90 isolates. Only 10 strains (11.11%) were found to be MRSA. From these 10 primers, only 9 gave clear amplification products. 91 fragment l
... Show MoreAbstract: The increased interest in developing new photonic devices that can support high data rates, high sensitivity and fast processing capabilities for all optical communications, motivates a pre stage pulse compressor research. The pre-stage research was based on cascading single mode fiber and polarization maintaining fiber to get pulse compression with compression factor of 1.105. The demand for obtaining more précised photonic devices; this work experimentally studied the behavior of Polarization maintaining fiber PMF that is sandwiched between two cascaded singe mode fiber SMF and fiber Bragg gratings FBG. Therefore; the introduced interferometer performed hybrid interference of both Mach-Zehnder
... Show MoreThe ï¤- Multiple mixing ratios of ï§-transitions from levels of 56Fe populated in 56 56 ( , ) Fe n n Fe ï§ ï‚¢ reactions are calculated by using const. S.T.M. This method has been used in other works [3,7] but with pure transition or with transitions that can be considered as pure transitionsØŒ in our work we used This method for mixed ï§ - transitions in addition to pure ï§ - transitions. The experimental angular distribution coefficients a2 was used from previous works [1] in order to calculet ï¤- values. It is clear from the results that the ï¤- values are in good agreement or consistent, within associated errors, with those reported previously [1]. The discrepancies that occur
... Show MoreIn dieser Kurzgeschichte werden die Züge der Trümmerliteratur präzis dargestellt. Die wurde von Heinrich Böll im Jahr 1958 geschrieben. In der vorliegenden Arbeit konzentriere ich mich auf vielfältige Stoffe in Bezug auf die Lage nach dem Zweiten Weltkrieg. So gab ich dieser Arbeit einen besonderen Titel, der die Dimensionen dieser Kurzgeschichte heißt. Ich meine hier, die profunde Interpretation dieses Werkes, denn ich fand zwar hinter einigen Wörtern eine ganze Geschichte, die uns der Erzähler dadurch zeigen wollte.
So teilte ich diese Wörter (Grab, Schatten, Last, Schrei) als Dimensionen, von denen diese Arbeit umgekreist wird.
Diese Arbeit besteht aus vier Kapiteln, die aufeinander aufgebaut sind. Im ersten K
... Show More