The study included gross morphology and pollen of plants – which collected during field trips , and dry ones for most specimen preserved with the Iraqi herbaria – related to the genus Lycopus L. , and to identify the unidentified species and rectify the error there in , so according to that the species L. europaeus L. only were specified for the genus . Through this work the varity L. europaeus var. glabrescens Schmidely were found at the first time , and suggested to record anew for Iraq . Pollen were of medium size, and had an ellipsoid shape in the equatorial view , and hexagonal in the polar view. The ecological and soil quality where these genus plants grows were specified , and were geographically distributed on natural Iraqi territories for each one .Plate was made from many pictures in addition to the map for geographical distribution.
The term "semantic exchange" was popularized in Arabic, especially in derivatives, grammatical structures, etc., but it came under different names or terms, including deviation, deviation, transition, displacement, tooth breach, replacement, attention, etc. In the rooting of this term through its study in language and terminology, and among linguists, grammar and others, we have reached a number of results, including The existence of a harmonization between the lexical and idiomatic meaning of the term exchange, and the phenomenon of semantic exchange is a form of expansion in language, and that the first language scientists They had turned to this And studied under Cairo for different names, as noted above.
The issue of the research lies in the non-representation of the models developed for the communication process in the interaction and networking processes through social media, as the research sought to build a network model of communication according to the specific data and features of social media platforms in order to reach a special generalization to understand how the process of networking operates in cyberspace.
The researcher followed the analytical survey approach as she described the communication models outwardly in order to be able to build a networked communication model that represents the flow of post-reactive communication. Therefore, it has been named "Nebula - Sadeem" after the concept of post-space and cosmic g
... Show MoreThis paper is an attempt to clarify the impact of Postcolonialism, one of the most
challenging fields of study that has emerged in recent years, on representations of women in
once-colonised countries and in Western locations. It discusses the influence of cultural
differences on the status and identity of a woman who experience ‗multiculturalism‘. The
study is an analytical reading of a contemporary novel written by the Iraqi writer Betool Al-
Kudairi. The emphasis lies on the clash between two different cultures and traditions
represented by the British mother and the Iraqi father and its effect on the life and identity of
the protagonist. The main focus is on idea of ‗hybrid identity‘ and the absence of th
The development of thyroid gland in five developmental stages of common carp, Cyprinus carpio L. The thyroid originates from the pharyngeal floor as a median ventral keel in late embryos having four pairs of arches. It differentiates into profollicular aggergations and true follicles with flattened walls and empty lumina or with lumina filled with cotton waste-like material in three days-old elvers. Secretion of homogeneous eosinophilic colloid with a limited increase in the height of follicular wall is noted in five days-old elvers. In nine days-old individuals the follicles increase in size due to coallescence. The thyroid gland reaches its maximal activity as judged by its histology in one-two months-old individuals. The gland is of t
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreAbstract :
The research aims to study the basic concepts of banking productivity and discuss different approaches to study what ends to identify the most important possible standards applied to measured within the Iraqi banking environment as well as research into the causes of low and high Iraqi banking productivity and identify possible treatments to curb those reasons as to ensure the rise. And in line with the research problem, which states what is the level of productivity and what are the causes of decline and the rise in private banking research sample individually. And what the Iraqi private banks and what is the relationship between performance and the impact of productivity change in the perform
... Show MoreAbstract
This research aims to study human error effects in the banking risks in the private banks through the measurement and testing of human error effect in every kind of banking risks types and stand on the most closely associated with the risks in order to focus on them and make appropriate processors have with respect to and increase the availability of skills and expertise required to carry out banking operations of error-free manner.
Find dealt with human error in terms of meaning and understandable, classifications and types, causes and consequences and its approaches and theories. Also addressed placed banking risks in terms of meaning and concept, species and entr
... Show MoreThe electoral mechanism is remarkably clear, a political tool for institutional construction, directing political life, forming the political scene, and forming the partisan scene. This process was through the design of electoral laws, as elections in Tunisian political history represented the indicator of its slow and accelerated transformations, so The elections in Tunisia usually coincide with important political stages, accompanied by legislative or constitutional amendments in general, Islamic or secular forces have played a fundamental role in promoting the democratic experience and the principle of the peaceful transfer of power. This led to the formation of a national consensus that would help the country not enter into political
... Show More