The effects of temperature on an exotic aquatic snail Pomacea canaliculata (Lamarck, 1819) collected from the Shatt Al-Arab intertidal zone were investigated. A series of laboratory experiments were conducted during the summer period of 2017. Individuals of new born snails hatched in the laboratory from adult snails were collected from Shatt Al-Arab intertidal zone, and subjected to five fixed temperatures: 15, 25, 35, 40 and 45 Cº, after short term thermal acclimation. The heartbeats (HB) were counted at each temperature level. The results showed significant direct increase of HB from 15 Cº (19.8 HB/min) up to 25 Cº (76 HB/min) (P<0.05) as well as from 25 Cº to 35 Cº (93 HB/min). At 40 Cº the snail HB shows only slight insignificant increase (79 HB/ min). At 45 ºC the HB became irregular and showed negative thermo cardiac activity (HB dropped to 50.4/min). The minimum HB rate of 11/min was recorded at 15 Cº and the maximum value of 119 HB/min was recorded at 40 Cº. The study concluded that P. canaliculata can be highly stressed when exposed to extreme temperature experienced during the prolonged summer months and will no longer tolerate living in the intertidal zone of Shatt Al-Arab.
Abstract
The developments of technology and information that is sweeping the world based on the factors of pressure on the accounting profession in general, and the authors of the accounting information. That becouse the makers of administrative decisions have become in need of new information fit and the environmental situation of the new competition and try to enter new markets,
... Show MoreMuch has been written about Baghdad in the history books and documents ,about the Origin of its call , Reality ,history ,peoples ,Rulers and all that have passed since the beginning of creation and so far...
The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreWhat linguists mentioned about the infinitive and its use in the linguistic levels of speech, whether with its verb, or what was mentioned in the difference between the infinitive and the noun of the source, are matters that are related to the phenomenon of hearing in speech, a need necessitated by the nature of the linguistic law and its connection with the Arabic dialects, which proceeded in the linguistic levels to form Phenomenon inherent in the use of the source and the name of the source
The Arab economy suffers from many structural imbalances problems which are getting complicated by the appearance of the world economic variables.
This change held risky challenges for the Arab economies in the light of unsuitable regional and international conditions. Since that it has been very essential for the Arab experts, especially those related to economy and politics, to face those new challenges or, at least, adapt with them believing that they can have both positive and negative impacts on the Arab economy.
This study has acquired its importance in the light of the critical levels the Arab economy reached out of the world economic variables, resulting in long-term
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
مشكلة البحث
وتعد مرحلة المراهقة من اصعب المراحل التي يمر بها الفرد واخطرها اذ يطلق عليها بمرحلة التفكير المجرد ، وهي مرحلة حاسمة في حياته اذ تتكون لديه معالم الشخصية .أنهم خزين الامة الحقيقي من الطاقات الحيوية التي لا تنضب لذا يجب الاهتمام بهذه الشريحة من المجتمع وتطويرهم وتوجيههم لاسلم الطرق للحفاظ على مستقبلهم ومستقبل الا
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreWhat linguists mentioned about the infinitive and its use in the linguistic levels of speech, whether with its verb, or what was mentioned in the difference between the infinitive and the noun of the source, are matters that are related to the phenomenon of hearing in speech, a need necessitated by the nature of the linguistic law