The numerical response of Chrysoperla mutata MacLachlan was achieved by exposing the larvae of the predators to various densities of dubas nymphs Ommatissus lybicus DeBerg. Survival rate of predators’ larvae and adults emergence increased with increasing consumption . Repriductive response of predator was highly correlated with the amount of food consumed (+0.996).
Las formas verbales: el infinitivo, el gerundio y el participio, son derivados verbales que se comportan como sustantivos, adverbios o adjetivos, respectivamente; aunque, dado su carácter verbal pueden también funcionar como verbos y, por tanto, como núcleos del predicado.
El presente trabajo presenta una visión general sobre las formas no personales del verbo en español. Se debe recordar que las formas no personales del verbo tiene funciones y valores dentro de la oración.
Este trabajo lo dividimos en dos partes: la primera presenta un breve marco teórico en que se explica las formas no personales del verbo y como se forman además de sus funciones.
Abstract
... Show More
Metaphor is a linguistic phenomenon related to people's cultures. It is an integral part of cultural heritage. This paper tackles the use of animal-based metaphors in the field of football club titles so as to draw comparisons between those in Russian with their counterparts in Arabic. Names of animals are used to refer to some clubs and teams, where these names or titles reflect animal features such as strength, preying on victims; or animal figures are employed in the club symbols, or due to the similarity of the club shirt to the animal outer shapes in colours. For instance, "an-Nawaris", which means gulls in English, is used to refer to az-Zawraa club du
... Show More
Background: Mothers are considered as the key role in effect on child's dental behavior. So it is important to involve her in oral health promotion program to prevent early childhood dental caries from occurring in early age. Objectives: To identify the knowledge, practice and attitude of mothers about the oral health of their children. And to measure the change in oral hygiene of children aged (4-7) years old after one month of interventional program on their mothers. Type of study: Non-randomized interventional.Methods: Non-randomized interventional study for one month in Al Shaab area in Baghdad to 65 mothers who have children aged (4-7) years .A modified administrated questionnaire is given to assess mothers’ knowledge, practice an
... Show MoreThe present paper discusses one of the most important Russian linguistic features of Arabic origin Russian lexes denoting some religious worship or some political and social positions like Qadi, Wally, Sultan, Alam, Ruler, Caliph, Amir, Fakih, Mufti, Sharif, Ayatollah, Sheikh.. etc. A lexical analysis of the two of the most efficient and most used words of Arabic origin Russian lexes that are “Caliph and Sheikh” is considered in the present study. The lexicographic analysis of these words makes it possible to identify controversial issues related to their etymology and semantic development.
The study is conducted by the use of the modern Russian and Arabic dictionary, specifically, (Intermediate lexicon Dictionary
... Show MoreThe urban Gentrification is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023