The Present Work includes the study of the population dynamics of Armadillidium vulgare in AL- Jadiriya region in Baghdad. Monthly samples were collected using a quadrat 0.0625 m2 from November 2007 to November 2008.. The population density of A.vulgare, ranged from 880 ind/m2 in May to251 ind/m2 in January respectively. This species showed high aggregation dispersion in the study area. The sex ratio showed that the number of females were more than that of males and significantly differd (P < 0.05) during the reproductive months. Furthermore, it was found that the juveniles of species were present at most time of the year, But the large sized groups have been observed during summer and spring. And showed a positive linear correlations between the size of ovigerous females and the number of eggs and The incubation period ranged from 30 to 50 day in this species, The number of eggs per brood ranged between 9- 32 egg in this species. The cohort analysis of the populations showed that A.vulgare had three generations during the study period .The life table analysis results showed that the expected life for this species was six months. And this species had single breeding season started from April to September
The present work deals with five species of parasitic Hymenoptera belonging to Pteromalidae, Eupelmidae and Eurytornidae which have been reared from brachid beetles. A new species, Eurytoma irakensis is described and the species, Bruchocida orientalis Crawford is recorded for the first time from Iraq.
This research is a modest effort to talk about the great world of ancient lineage, Imam Majd al-Din Abu Saadat, known as Ibn al-Atheer island, through the statement of his name, surname, nickname, family, elders and his pupils and his most important works.
It also deals with the modern research on his famous book in the field of modern science called (the end in the strange talk and impact), which is one of the most wonderful books of modern and especially the strange talk, through the scientific effort of the Imam and the importance of the book and methodology, and the most prominent aspects of the service and care of Ibn Al Atheer For the modern stranger, which boils down to two aspects:
First: the linguistic rooting of the stran
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThe rotor dynamics generally deals with vibration of rotating structures. For designing rotors of a high speeds, basically its important to take into account the rotor dynamics characteristics. The modeling features for rotor and bearings support flexibility are described in this paper, by taking these characteristics of rotor dynamics features into standard Finite Element Approach (FEA) model. Transient and harmonic analysis procedures have been found by ANSYS, the idea has been presented to deal with critical speed calculation. This papers shows how elements BEAM188 and COMBI214 are used to represent the shaft and bearings, the dynamic stiffness and damping coefficients of journal bearings as a matrices have been found
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreThis cross-sectional, questionnaire-based study evaluated the knowledge, attitude and practice towards breast cancer and breast self-examination [BSE] among 387 [302 females and 85 males] educated Iraqis affiliated to 2 Iraqi universities. The participants were categorized into 3 occupations: student [71.3%], teaching staff [10.3%] and administrative staff [18.3%]. About half of the participants had a low knowledge score [< 50%]; only 14.3% were graded as [Good] and above. Almost 75% of the participants believed that the best way to control breast cancer was through early detection and other possible preventive measures. Most participants [90.9%] had heard of BSE, the main source of informatio
... Show MoreBackground: Routine supplementation of vitamin D to infants is justifiable since vitamin D deficiency, and its consequences are highly prevalent not only in developing countries but worldwide. Maintaining a normal level of vitamin D is crucial in order to have a normal skeletal, as well as, extra-skeletal health. Knowledge of mothers regarding importance of vitamin D supplementation affect the health of their babies in a positive manner if accompanied by appropriate practice.
Objective: To determine the level of knowledge, attitude and practice of Iraqi mothers of under or equal 12 months old infants in Baghdad, AL-Rusafa, regarding vitamin D supplementation for their infants.
Typ
... Show More