A total of 60 species of aquatic oligochaetes were identified in different sites within Tigris-Euphrates basin / Iraq, including River Tigris, River Euphrates, Southern marshes ( Al-Haweiza , Al-Hammar and Al-Chebaiesh ) , Shutt Al-Germa, and Shatt Al-Arab. In River Euphrates 39 species were identified, 40 species from River Tigris and 32 species from Shatt-Al-Arab and southern marshes.The identified species were classified as four species of Family Aeolosomatidae, 54 species of Naididae ( 31 Naidinae , 8 Pristininae and 15 Tubificid worms), one species of each of Lumbriculidae ( Lumbriculus variegates ) and Lumbricidae ( Eiseiella tetraedra). Among Aeolosomatidae , Aelosoma aquaternarium, A. Liedyi, A. variegatum and A. hemprichi, in which, A. variegatum was the most frequent species, found in Euphrates river. Naidinae community were represented by five species of genus Chaetogaster, two species of each of Paranais, Slavina, & Stylaria, four species of Allonais , and seven species of each of Dero and Nais, in addition to Stephensoniana trivandrana, Specaria josinae and Ophidonais serpentina. Nais variabilis was the most abundant and frequent species in River Tigris while Stylaria lacustris & Ophidonais serpentina are abundant in River Euphrates . Species of Pristininae were representative by four species of genus Pristina and three species of genus pristinella, among them Priatina longiseta is the most abundant species.Tubificid worms, Branchuira sowerbyi and Limnodrilus hoffmeisteri were the most frequent and abundant species in the surface sediments of Iraqi waters. Beside L. hoffmeisteri , other five species of Limnodrilus, two species of Potomothrix, and a single species of Tubifex tubifex , Embolocephalus velutinus, Aulodrilus piguetia, Psammoryctides moravicus and Rhyacodrilus coccineus were recorded.
Cognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the exi
... Show MoreThis paper is devoted to the discussion the relationships of connectedness between some types of graphs (resp. digraph) and Gm-closure spaces by using graph closure operators.
In this paper, we use concepts and results from percolation theory to investigate and characterize the effects of multi-channels on the connectivity of Dynamic Spectrum Access networks. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from-a phenomenon which we define as channel abundance. To cope with the existence of multi-channels, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocol, it becomes difficult for two nodes to agree on a common channel, thereby potentially remaining invisible to each other. We model this
... Show MorePrecarity means the lack of social and economic networks; a considerable exposure to danger and harm. Minority groups are precariat for they lack rights and full citizenship. Precarity is related, states Judith Butler, with the individual’s performativity, and his ability to perform his gender role. Toni Morrison continually goes to past to retell the history of African Americans. The issues of race, gender and national identity are recurrent in her work. Reading her book Home (2012) evokes the idea of precarity and performativity since the two main characters, Frank and Cee are precarious characters that fail to perform their gender role properly, and eventually are exposed to hazard and harm. This research displays how African American
... Show MoreKnowledge and awareness towards cryptosporidiosis were assessed in this study during the period from April 2009 till June 2011, among 188 person of both gender which were divided in different groups and sub groups as following Group 1: include 48 physician from different hospitals and primary health care centers in Baghdad this group were sub divided into 30 Specialist doctors and 18 General practitioners doctors. Group 2 : include 45 teaching staff member from Biology department , Biotechnology department in University of Baghdad and AL-Nahrain University as well as teaching staff member from the college of medicine – University of Baghdad and University of Mustansiryah, this group were sub divided into 9 Ph.D and 36 M.Sc. + B.Sc. me
... Show MoreWA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show MoreWA Shukur, FA Abdullatif, Ibn Al-Haitham Journal For Pure and Applied Sciences, 2011 With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious.
We have studied some types of ideals in a KU-semigroup by using the concept of a bipolar fuzzy set. Bipolar fuzzy S-ideals and bipolar fuzzy k-ideals are introduced, and some properties are investigated. Also, some relations between a bipolar fuzzy k-ideal and k-ideal are discussed. Moreover, a bipolar fuzzy k-ideal under homomorphism and the product of two bipolar fuzzy k-ideals are studied.
Diesel generators is widely used in Iraq for the purpose of maintaining electric power demand. Large number of operators engaged in this work encounters high level of noise generated by back pack type diesel generators used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known., in present research , quastionaire was adsministered 86 repondents in Baghdad city were exposured to wide range of noise level (80-110) dB(A) with different ages and they have different skill discretion levels. Noise levels A-weigthed decibles dB(A) were measured over 8 weeks two times aday during the 2019 summer using a sound level meter.For predicting the wo
... Show MoreIn this paper we introduce a new class of sets called -generalized b- closed (briefly gb closed) sets. We study some of its basic properties. This class of sets is strictly placed between the class of gp- closed sets and the class of gsp- closed sets. Further the notion of b- space is introduced and studied.
2000 Mathematics Subject Classification: 54A05