Preferred Language
Articles
/
bsj-2738
Composition of fish assemblage in the East Hammar marsh, southern Iraq
...Show More Authors

The fish assemblage in the East Hammar marsh was studied during December 2009 to May 2010. The fish fauna of the marsh consisted of 17 native, 23 marine (49%) and seven alien species. The dominant species were Liza abu (14.6%), Carassius auratus (13.4%) and Thryssa mystax (11.2%). The resident species formed 44.7%, occasional species 36.1% and seasonal species 19.2% of the total number of fish species. Fish species diversity index ranged from 1.28 to 2.61, richness from 1.98 to 4.50 and evenness from 0.45 to 0.78. Salinity ranged from 1.45 to 7.74‰. The increase in the proportion of marine species (49%) in the fish assemblage due to marine waters progress from Arabian Gulf had an impact on the values of ecological indices and the composition of the fish assemblage of the East Hammar marsh.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Strategic Cohesion on Administrative Excellence
...Show More Authors

This research aims to test the effect of strategic cohesion with its dimensions (organizational excitement, organizational casting, organizational synergy) as an independent variable on administrative excellence as a dependent variable in the Ministry of Planning, and through surveying several employees (general managers, heads of departments,  and units managers). As a research community, and based on the importance of the research topic in the aforementioned research community. The researchers have adopted the descriptive-analytical using the questionnaire as the main data collection. 155 questionnaires were distributed, yet,114 of them were retrieved and 110 were used for final statistical analysis. The researchers used the relev

... Show More
View Publication
Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Imam Jaafar Al-sadiq University Journal Of Human And Social Sciences
Damage Resulting from the Promotion of Extremist Ideas
...Show More Authors

The freedom to promote ideas is one of the freedoms protected by constitutions and laws, and it is exercised by individuals through traditional and electronic media. However, this freedom must be exercised according to certain limits, represented by the necessity of respecting human rights, just as individuals have the freedom to exercise their right to publish and express their opinion in every way. Frankly, in return, she must respect the rights of others . Perhaps the development that has occurred in the various media, including journalism, radio, television, and the emergence of a new medium represented by the Internet, has contributed significantly to harming the security of individuals through the promotion of extremist ideas. This be

... Show More
View Publication
Publication Date
Fri Dec 31 2010
Journal Name
Lambert
 Exploring Identity Through the Healing Power of love
...Show More Authors

The book gives details about the healing power of love

Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
A Note on the Perturbation of arithmetic expressions
...Show More Authors

In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fundamental tools of the forward error analysis are system of linear absolute and relative a prior and a posteriori error equations and associated condition numbers constituting optimal of possible cumulative round – off errors. The condition numbers enable simple general, quantitative bounds definitions of numerical stability. The theoretical results have been applied a Gaussian elimination, and have proved to be very effective means of both a prior

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Engineering
Hydraulic Analysis of the Samarra-Al Tharthar System
...Show More Authors

Low incoming discharge upstream of Samarra-Al Tharthar System leads to sediment accumulation and forming islands, especially an island upstream of Al Tharthar Regulator. This island and the sedimentation threaten the stability of the structure and reduce the efficiency of the system. This study aims to hydraulically identify the sedimentation problem mentioned above, to find solutions of how to control the sediment problems, and to develop the capacity of
the system for 500 years return period flood of 15060 m3/s. Surface Water Modeling System (SMS10.1) with two dimensional depth average models (RMA-2) software were used to simulate and analyze the system. The results of analysis showed that the maximum permissible discharge through t

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 28 2019
Journal Name
International Journal Of Simulation: Systems, Science & Technology
On the Estimation of Nonparametric Copula Density Functions
...Show More Authors

In this research, we present a nonparametric approach for the estimation of a copula density using different kernel density methods. Different functions were used: Gaussian, Gumbel, Clayton, and Frank copula, and through various simulation experiments we generated the standard bivariate normal distribution at samples sizes (50, 100, 250 and 500), in both high and low dependency. Different kernel methods were used to estimate the probability density function of the copula with marginal of this bivariate distribution: Mirror – Reflection (MR), Beta Kernel (BK) and transformation kernel (KD) method, then a comparison was carried out between the three methods with all the experiments using the integrated mean squared error. Furthermore, some

... Show More
View Publication
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of The College Of Languages (jcl)
Magic comparative study of the Old Testament mediator
...Show More Authors

Magic is an attempt to affect people or events either by cheating and charlatanry means or by expecting devil powers in order to bring advantage or to avoid a harm or to bring harm to others or to for see the future and divition .

     Magic is either real by the devil like writing majic works to prevent the marriage of someone and to depart the husband and his wife , causing someone to be distressed the physical and nervous diseases and stopping the stories and the project; majic can be artificial by being intellect and legerdemain and different types of triks and to cancel the magic by using magic or by protecting the self by using Talismans as well as presenting or offering sacrificers to the masters and th

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
The Dominant Metric Dimension of Corona Product Graphs
...Show More Authors

The metric dimension and dominating set are the concept of graph theory that can be developed in terms of the concept and its application in graph operations. One of some concepts in graph theory that combine these two concepts is resolving dominating number. In this paper, the definition of resolving dominating number is presented again as the term dominant metric dimension. The aims of this paper are to find the dominant metric dimension of some special graphs and corona product graphs of the connected graphs  and , for some special graphs  . The dominant metric dimension of  is denoted by  and the dominant metric dimension of corona product graph G and H is denoted by .

View Publication Preview PDF
Scopus (18)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Imdc-sdsp
Emotion management among the headmaster of intermediate schools
...Show More Authors

Publication Date
Mon Apr 03 2023
Journal Name
Aro-the Scientific Journal Of Koya University
The Most Common Characteristics of Fragile Video Watermarking
...Show More Authors

The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject shou

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref