Preferred Language
Articles
/
jnhm-144
HUNTING BEHAVIOR OF THE ORIENTAL HORNET, VESPA ORIENTALIS L., AND DEFENSE BEHAVIOR OF THE HONEY BEE, Apis mellifera L., IN IRAQ
...Show More Authors

When the guard honey bees, Apis mellifera L., form a clump at the hive entrance or on the flight board, the oriental hornet, Vespa orientails L., either creeps toward the clump or hovers over it in order to take a bee. Once the hornet creeps, only few bees facing the hornet become alert, rock their heads and antennae, open their wings, and take a posture of defense. The rest of the clump stays listless without any signal of concern. However, the clump stays dense and the defending bees do not detach themselves neither from the rest of the clump nor from each other. For this reason, it is very difficult for the hornet to grab a bee unless the latter makes a “mistake” by detaching herself from other adjacent bees. If the hornet grabs such a bee, the other defending bees will not attack the hornet to free that bee even when the latter is one centimeter from the others. The defending bees can capture the hornet only when the latter grabs one of them which stands very close to the others. The hornet seems very “aware” of such a situation; hence she seldom becomes a captive. On the other hand, hovering over the clump makes it easier for the hornet to grab a bee. The hovering puts all the clump, rather than part of it, on alert. If the hornet is persistent, which is not often the case, then the clump will no longer be dense. The bees will panicly disperse all over the flight board; hence the hornet can find a detached bee and grabs it easily. The hornet also waits on wing in front of the hive to capture an outgoing or incoming flying bee but the latter usually maneuver to escape. Also, foraging bees reduce their activity during main hours of hornet presence. Among the main factors reducing the hornet impact are the continuous chasing of hornets to each other and the non-persistent attempts of the hornets when they attack bee clumps.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
The development of Russian-Iraqi relations for the period (2011-2019)
...Show More Authors

Receipt date: 12/28/2020 accepted date: 20/1/2021 Publication date: 12/31/2021

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

Russia has emerged as a rising and influential power in the international arena, especially with Vladimir Putin's assumption of power and his desire for the rise of Russia and the end of the "unipolarism" represented by the hegemony of the United States of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
The effect of The Organizational Agility On High Performance ( Applied Search )
...Show More Authors

Abstract

The current research aims to know  the  reality of the  research's coefficients, to know  correlation and effectiveness  between  the  organizational  Agility  and high performance . The current research  has been applied on  the official banks , including  a sample of  senior administration  members  (120) ; besides , the research has used questionnaire  that being considered as the main tool for gathering  information  and data . It includes  59 questions  in addition to  the personal interviews  program  as to support  the questionnaire and to fulfill a great deal of reality. It has been anal

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 21 2018
Journal Name
Iraqi Journal Of Physics
A simple voice communication using the modulation of the reflected light
...Show More Authors

There is no adopt in the importance of the optical communications in scientific civil and military applications because of it’s simplicity in manufacturing and it's low cost. The method of optical communication depends upon bearing the light beam the translated informations by a method called the light modulation. This method depends upon changing some light properties as frequency, amplitude and pulse duration according to the translating informations. The changes in the first two properties are concerned optically with the analog modulation while the third one concern at most with digital modulation. All past methods are expensive with low efficiency and needs electrical or magnetic fields. In this technique the source of voice used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
دراسات قانونية
The Legal Nature of the Build-Operate- transfer-Ownership Contract (B.O.T.)
...Show More Authors

The legal nature of the Build-Operate-Transfer-Ownership Contract (B.O.T) The Build, Operate, and Transfer of Ownership Contract (BOT) has emerged as the most successful and safest method for involving the private sector in public sector services. The major infrastructure projects that are built through the BOT contract are no longer financed by the state and its budget, but the private sector has played a major role in financing These projects, especially developing countries that need to establish infrastructure or modernize their existing infrastructure, especially in the areas of transport, communications, services, electricity, water ..... and other public utilities.

Publication Date
Tue May 30 2006
Journal Name
Baghdad University
Unpublished Cuneiform Texts From The Reign Of The King Ammi Şaduqa
...Show More Authors

The cuneiform texts considered one of the most important resources which play an important role help us to know how was the economic , politic and religious manner and every thing have relation of the history of Mesopotamia which contain many of information that enrich our knowldgement every side of Mesopotamia civilization since using writing as away to register the science and human knowldgement . The city of Sippar (Abu –Habba ) was one of most important city of ancient Mesopotamia which mentioned as one of first five Mesopotamian cities found before floating and it exposed through excavating rich one of them tablet which some of it dated to old Babylon period . The king Ammi-Saduqa has a big share of tablet we study number of thi

... Show More
Publication Date
Mon Sep 26 2022
Journal Name
Journal Of Advanced Research In Hr And Organizational Management
Entrepreneurial Performance of the Organization According to the Approved Training Strategy
...Show More Authors

The research aims to determine the role of the training strategy with its dimensions of (strategic analysis, formulation of training strategy, implementation of training strategy, evaluation) in the pioneering performance of the organization with its dimensions of (pre-planning , renewal and modernization, efficiency, effectiveness). Important and modern in pioneering performance and training strategy, and in recognition of the importance of the subject and the expected results of the surveyed banks, an analysis was made of the data obtained through field visits in addition to the questionnaire and interviews ,and the most prominent results that were reached were taking the research sample into consideration all the requirements of the trai

... Show More
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
From the flags of The Koofic Grammar: Abdullah Al-Tuaal (243A.H)
...Show More Authors

    This research has tackled a scientific figure belongs to Koofi grammatical school. He is Abdullah Al-Tuaal who has occupied the fourth layer among the Koofi grammarians. There was a confusion between him and another Koofi grammarian from the same layer (Mohammed Bin Qaadim) in some old references. This research has clarified this confusion to affirm that they are two different grammarians.This research also tackles the scientific status of Al-Tuaal and the grammatical views that have been ascribed to him in addition to the analysis and discussion of these views. All this in the light of what has been mentioned in grammar books about the issues in which these views were stated.

View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Computing And Digital Systems
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the method of parsing anomalous valueIn estimating the character parameter
...Show More Authors

In this paper the method of singular value decomposition  is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.

View Publication Preview PDF
Crossref
Publication Date
Mon Sep 30 2013
Journal Name
International Journal Of Network Security & Its Applications
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding

... Show More
View Publication Preview PDF
Crossref