The variation in wing morphological features was investigated using geometric morphometric technique of the Sand Fly from two Iraqi provinces Babylon and Diyala . We distributed eleven landmarks on the wings of Sand Fly species. By using the centroid size and shape together, all species were clearly distinguished. It is clear from these results that the wing analysis is an essential method for future geometric morphometry studies to distinguish the species of Sand Flies in Iraq.
The aim of this paper is to present the first record of ctenophore species Pleurobrachia pileus (O. F. Müller, 1776) in the coral reef as was recently found in Iraqi marine waters. The specimens were collected from two sites, the first was in Khor Abdullah during May 2015, and the second site was located in the pelagic water of the coral reef area, near the Al-Basrah deep sea crude oil marine loading terminal. Three samples were collected at this site during May 2015, February and March 2018 which showed that P. pileus were present at a densities of 3.0, 2.2 and 0.55 ind./ m3 respectively. The species can affect on the abundance of other zooplankton community through predation.
... Show More
The main objective of the audit is The asset is maintained and operated efficiently and is done through to detect fraud and errors in the financial statements and to verify the accuracy and accuracy of the information contained therein and to give a neutral technical opinion on the basis of that, thus the auditor has a professional responsibility in achieving this goal, and that the effects of issuing a wrong opinion works on The loading of the beneficiaries is significant damage, And therefore the presence of any error or bias of the auditor when taking personal judgments in relation to the determination of the relative importance and the selection of audit samples and determine the adequacy and validity of evidence and implemen
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreA new generalizations of coretractable modules are introduced where a module is called t-essentially (weakly t-essentially) coretractable if for all proper submodule of , there exists f End( ), f( )=0 and Imf tes (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented.
Abstract
Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built t
... Show MoreAmong Persian poets and literary works, Ferdowsi and Shahnameh have a distinctive and prominent place. Since the 5th C. AH , they took the interest of all Persian language and literature scholars and were one of the first books to be translated into different languages including Arabic by Al Fatih Bin Ali Bin Mohammed Al-Bandari in the year of (620)AH .Because it was completed in the early 7th C. AH and in terms of antiquity, there is no older copy than of Al-Bandari’s version which holds great value in the analysis of Shahnameh other different copies.
To find out the how far analogy goes, the present paper makes a general comparisons of Bijan and Manijeh in Shahnameh Fer
... Show MoreThe experiment was conducted in Al- Mahaweel Research Station in Babel Governorate, Ministry of Agriculture during autumn season 2016-2017 to determine the role of irrigation management processes and micronutrient fertilization in growth and productivity of two varieties of wheat IPA 99 and Al-Rasheed 22 in clay loam soil classified as Typic Torriflovent. The experiment included four irrigation treatments and six fertilization treatments. The experiment was designed under randomized complete block design (RCBD) with three replications. Wheat grain IPA 99 and Al-Rasheed 22 varieties were planted in 23/11/2016 and harvested in 13/5/2017. The amount and periods of irrigation depended on sensors reading of volumetric water content was measured
... Show More