A total of 60 species of aquatic oligochaetes were identified in different sites within Tigris-Euphrates basin / Iraq, including River Tigris, River Euphrates, Southern marshes ( Al-Haweiza , Al-Hammar and Al-Chebaiesh ) , Shutt Al-Germa, and Shatt Al-Arab. In River Euphrates 39 species were identified, 40 species from River Tigris and 32 species from Shatt-Al-Arab and southern marshes.The identified species were classified as four species of Family Aeolosomatidae, 54 species of Naididae ( 31 Naidinae , 8 Pristininae and 15 Tubificid worms), one species of each of Lumbriculidae ( Lumbriculus variegates ) and Lumbricidae ( Eiseiella tetraedra). Among Aeolosomatidae , Aelosoma aquaternarium, A. Liedyi, A. variegatum and A. hemprichi, in which, A. variegatum was the most frequent species, found in Euphrates river. Naidinae community were represented by five species of genus Chaetogaster, two species of each of Paranais, Slavina, & Stylaria, four species of Allonais , and seven species of each of Dero and Nais, in addition to Stephensoniana trivandrana, Specaria josinae and Ophidonais serpentina. Nais variabilis was the most abundant and frequent species in River Tigris while Stylaria lacustris & Ophidonais serpentina are abundant in River Euphrates . Species of Pristininae were representative by four species of genus Pristina and three species of genus pristinella, among them Priatina longiseta is the most abundant species.Tubificid worms, Branchuira sowerbyi and Limnodrilus hoffmeisteri were the most frequent and abundant species in the surface sediments of Iraqi waters. Beside L. hoffmeisteri , other five species of Limnodrilus, two species of Potomothrix, and a single species of Tubifex tubifex , Embolocephalus velutinus, Aulodrilus piguetia, Psammoryctides moravicus and Rhyacodrilus coccineus were recorded.
This research considers the preservation of environment through recycling old toys. This is achieved by transforming the old toys into educational clothing accessories for kindergarten stages. The research methodology adapts both descriptive and applied approaches. The research questionnaire targeted a sample of 35 teachers to collect information about the waste toys in kindergarten. Also, another sample of 30 teachers and mothers were targeted to measure the suitability of the clothing designs for the early childhood stages. The results shows that both teachers and mothers were well satisfied with clothing accessories designed with the toys waste. This concept contributes to limiting the pollution caused by toys and could save time, eff
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThe study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con
... Show MoreBackground: Poly cystic ovary syndrome is a common disorder in women of reproductive age, it is associated with disturbance of reproductive, endocrine and metabolic functions. The pathophysiology of PCOS appears to be multifactorial and polygenic. Leptin seems to play an important role in pathophysiology of PCOS especially in women with BMI ≥25kg/m2. Objectives: To assess leptin level in both PCOS and healthy women and explore the relation to their body weight and body mass index. Patient and Methods: A total of 120 women were enrolled in this study, 60 women (50%) had PCOS (study group) and the reminder 60 women (50%) were healthy women and considered as control group. BMI was calculated first. Both groups were further sub
... Show MoreVisceral leishmaniosis is one of the most fatal old-world neglected disease with estimated 90 thousand worldwide cases emerge each year. In Iraq, the cutaneous and visceral form are endemic but available chemotherapies are either toxic with diverse side effects, expensive available drugs or parasite …
Abstract: The aim of the current research is to find out the extent to which systems thinking skills are included in the mathematics textbook scheduled for the third intermediate grade for the academic year (2020-2021) by answering the main research question: What are the systems thinking skills included in the mathematics textbook for middle third grade? The analytical descriptive approach was used, and to achieve the goal of the research, a list of the main systemic thinking skills and sub-skills was prepared, and after analyzing the content of the mathematics textbook, the reliability of the analysis was verified through the analysis over time and through others, and it obtained a reliability rate of 98% us
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MorePraise be to God, who started his book with the praise of himself and prayers and peace be upon those who have no prophet after him and his family and companions and those who followed them with charity until the Day of Judgment.
For it is known to every researcher in jurisprudence and its origins that the semantics in terms of formulas for assignment are divided into an order and a prohibition, and I have seen it necessary to write a small research on the prohibition, and since this topic is complex, and has a great impact on the difference of scholars, I decided to write on one issue of it And it is the absolute prohibition and its effect on the difference of jurists, and what is meant by the absolute p
This study we have made a subject of fanny podcast in electronic media, as a new way to express different issues by the public, This study focuses started on how to address social issues in Alegria by ANAS TINA vidéo on the youtube network , you are to know the trends of young amateur about the various issues dealt with as well as the most important methods used to convince browsers.
The researcher used the survey method based on studying 10 episodes videos of blogger ANAS TINA.
The result of the study found that the most important issues are the abduction of children, teaching in Algeria; women in Algeria, The negative aspects of the issues addressed have been established in order to direct public opinion and awareness of ph