Regular sampling for six months from January to July 2012 were taken in small, shallow, perennial, standing ponds near the Greater Zab River, Gwer district, Erbil. A variety of physicochemical parameters were determined. Air and water temperature were falling between 15.2 - 34.7 ? C and 15.5 and 26.5 ?C. The waters are neutral (pH 7.38-8.27), hard, alkaline, salty, high in TDS and EC (892-966?S/cm, and rich in nutrients (NO3: 2.1-4.1mg/l, PO4: 0.33-0.62 mg / l , SO4: 24.7-80.2 mg / l ). The attention fixed on a filamentous blue- green algae Glaucospira Lagerheim, 1982) which is new to Iraqi flora. It is a filament (trichome), solitary, pale or yellowish blue – green, without sheath, Screw like coiled, motile, some of them are actively motile. In this study nine species were identified, classified and described with their original and hand drawing, photo vis.; Glaucospira sp.: syn. Spirulina abreviata Lemm. ex Kleb. and Lemm. , G. agilissima Lag., G. laxissima G.S.West syn.: Spirulina laxissima f. major Des., Glaucospira sp. syn.: Spirulina tenuior Lag.,Glaucospira sp. Syn.: Spirulina corakiana Playf., Glaucospira sp.syn.: Sprulina nodosa Scham. Glaucospira sp. syn.: Spilurina baltica Mart.,Glaucospira sp. Syn.: Spirulina magnifica Cop. And Glaucospira sp. syn.: Spirulina subtilissima Mostly they are from Spiralina Turpin ex Gomont.
The Financial systems can be classified into two types. The first is the market–oriented, which is applied in United States and United Kingdom. While the second is bank-oriented as in Japan and Germany.
This study tries to explain the reasons which make some countries adopt the first one instead of the second, and the contrary. So the study consists of three sections. The first deals with the concept of financial system and it are functions. The second displays the indicators which are used to classify the financial systems, while the third one is devoted to the factors that determine the type of financial system .These sections followed by some conclusions.
If feminist philosophy in the context of feminist research focuses on how to produce an alternative knowledge and culture for women and forming anew awareness of their roles in the face of prevailing misconceptions then the topic of Islamic feminism is presented as a philosophical topic in the field of human knowledge to discuss how to produce an alternative knowledge of traditional knowledge prevailing in patriarchal societies to restore the balance of power and authority in the relationship between the sexes to create an effective feminist role in advocating for and defending womenś issues to achieve this Islamic feminism sought to establish an Islamic epistemology .
<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreBackground: Loss of tooth structure may be due to tooth to tooth contact and presence of abrasive components in the work environment. The aim of study was planned to evaluate the occurrence of dental attrition among Cement factory workers. Material and Method: The Sample included all workers chronically exposed to cement dust in the EL-Kubaisa cement factory (95 workers). A comparative group of workers (97) were non-exposed to cement dust was selected. All workers were males in gender with age range (25-55) years. The assessment of tooth wear was based on the criteria of smith and knight, 1984. Results: The maximum tooth wear score for exposed workers was 84.2% while non exposed workers was 38.1%,with statistical differences between two g
... Show MoreIn aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we
... Show MoreWildfire risk has globally increased during the past few years due to several factors. An efficient and fast response to wildfires is extremely important to reduce the damaging effect on humans and wildlife. This work introduces a methodology for designing an efficient machine learning system to detect wildfires using satellite imagery. A convolutional neural network (CNN) model is optimized to reduce the required computational resources. Due to the limitations of images containing fire and seasonal variations, an image augmentation process is used to develop adequate training samples for the change in the forest’s visual features and the seasonal wind direction at the study area during the fire season. The selected CNN model (Mob
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreIn the present paper, an eco-epidemiological model consisting of diseased prey consumed by a predator with fear cost, and hunting cooperation property is formulated and studied. It is assumed that the predator doesn’t distinguish between the healthy prey and sick prey and hence it consumed both. The solution’s properties such as existence, uniqueness, positivity, and bounded are discussed. The existence and stability conditions of all possible equilibrium points are studied. The persistence requirements of the proposed system are established. The bifurcation analysis near the non-hyperbolic equilibrium points is investigated. Numerically, some simulations are carried out to validate the main findings and obtain the critical values of th
... Show More