Preferred Language
Articles
/
jnhm-144
HUNTING BEHAVIOR OF THE ORIENTAL HORNET, VESPA ORIENTALIS L., AND DEFENSE BEHAVIOR OF THE HONEY BEE, Apis mellifera L., IN IRAQ
...Show More Authors

When the guard honey bees, Apis mellifera L., form a clump at the hive entrance or on the flight board, the oriental hornet, Vespa orientails L., either creeps toward the clump or hovers over it in order to take a bee. Once the hornet creeps, only few bees facing the hornet become alert, rock their heads and antennae, open their wings, and take a posture of defense. The rest of the clump stays listless without any signal of concern. However, the clump stays dense and the defending bees do not detach themselves neither from the rest of the clump nor from each other. For this reason, it is very difficult for the hornet to grab a bee unless the latter makes a “mistake” by detaching herself from other adjacent bees. If the hornet grabs such a bee, the other defending bees will not attack the hornet to free that bee even when the latter is one centimeter from the others. The defending bees can capture the hornet only when the latter grabs one of them which stands very close to the others. The hornet seems very “aware” of such a situation; hence she seldom becomes a captive. On the other hand, hovering over the clump makes it easier for the hornet to grab a bee. The hovering puts all the clump, rather than part of it, on alert. If the hornet is persistent, which is not often the case, then the clump will no longer be dense. The bees will panicly disperse all over the flight board; hence the hornet can find a detached bee and grabs it easily. The hornet also waits on wing in front of the hive to capture an outgoing or incoming flying bee but the latter usually maneuver to escape. Also, foraging bees reduce their activity during main hours of hornet presence. Among the main factors reducing the hornet impact are the continuous chasing of hornets to each other and the non-persistent attempts of the hornets when they attack bee clumps.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
The Broken Wings: The character of the Arab Christian |Woman in Sami Michael's Novel "Trumpet in the Wadi" versus "Jasmine" by Eli Amir: הכנפיים שנשברו דמות האישה הערבית הנוצרית ברומן " חוצוצרה בוואדי " של סמי מיכאל לעומת דמותה ב " יסמין " של אלי עמיר
...Show More Authors

Sami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Geological Journal
Multiple and Coherent Noise Removal from X-Profile 2D Seismic Data of Southern Iraq Using Common Depth Point Muting Procedures and Depending on Madagascar Open-Source Package
...Show More Authors

This article describes how to predict different types of multiple reflections in pre-track seismic data. The characteristics of multiple reflections can be expressed as a combination of the characteristics of primary reflections. Multiple velocities always come in lower magnitude than the primaries, this is the base for separating them during Normal Move Out correction. The muting procedure is applied in Time-Velocity analysis domain. Semblance plot is used to diagnose multiples availability and judgment for muting dimensions. This processing procedure is used to eliminate internal multiples from real 2D seismic data from southern Iraq in two stages. The first is conventional Normal Move Out correction and velocity auto picking and

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Study the Structural Properties of Porous Silicon and their Applications as Thermal Sensors
...Show More Authors

The photo-electrochemical etching (PECE) method has been utilized to create pSi samples on n-type silicon wafers (Si). Using the etching time 12 and 22 min while maintaining the other parameters 10 mA/cm2 current density and HF acid at 75% concentration.. The capacitance and resistance variation were studied as the temperature increased and decreased for prepared samples at frequencies 10 and 20 kHz. Using scanning electron microscopy (SEM), the bore width, depth, and porosity % were validated. The formation of porous silicon was confirmed by x-ray diffraction (XRD) patterns, the crystal size was decreased, and photoluminescence (PL) spectra revealed that the emission peaks were centered at 2q of 28.5619° and 28.7644° for et

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
STUDY OF TEMPERATURE EFFECT ON THE HARDNESS FOR EPOXY RESIN AND UNSATURATED POLYESTER
...Show More Authors

This search aim to measure Hardness for Epoxy resin and for unsaturated Polyester resin as base materials for composite Hybrid and the materials used is Hybrid fiber Carbon-Kevlar. The Hand Lay-up method was used to manufacture plates of Epoxy resin (EP) and unsaturated Polyester EP,UPE backed by Hybrid fiber (Carbon-Kevlar) and with small volume fraction 5,10 and 15 for every there are Layer of fibers (1,2 and 3). The hardness test was count for material EP, UPE resin and there composites and that we notice that the Hardness (HB) decreased with increase of temperatures.

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 05 2025
Journal Name
Bulgarian Journal Of Veterinary Medicine
The immunomodulatory role of clove and cinnamon extracts on Klebsiella pneumoniae infected rats.
...Show More Authors

This study aimed to investigate the ability of clove and cinnamon extracts to make pathogenic multidrug-resistant (MDR) Klebsiella pneumoniae more sensitive to the host’s immune system and thereby interrupt the bacterial infection process in the rat model. Therefore, 60 Wistar male rats were used in this study. The phytochemical constituents of the plant extract were analysed using the gas chromatography-mass spectrometry (GC-MS) technique. Then, the capability of the plant extracts, as prophylactic and treatment, against K. pneumoniae in rats was studied by estimating the complete blood counts (CBCs) and the serum concentrations of interleukin-4 (IL-4) and interferon-gamma (IFN-γ) before and after the treatment. The results showed that

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Al-kindy College Medical Journal
The Association between CRP Levels with Comorbidities, Species, and Complications of Severe Malaria
...Show More Authors

Background: Malaria remains a leading cause of mortality in sub-Saharan Africa (including Sudan). C-reactive protein (CRP) is useful as   a marker of severity in malaria. African studies have shown that serum CRP levels correlate with parasite burden and complications in malaria, especially falciparum. However, there are no data on CRP levels in Sudanese malaria patients.

This study aims to evaluate the association between CRP levels with comorbidities, species, and complications of severe malaria

Subjects and Methods: A cross-sectional study enrolled 65 severe malaria patients at Khartoum state hospitals during the period from April to June2021. Manifestations of severe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
International Education And Culture Studies (iecs)
The Impact of Virtual Trips on Lateral Thinking and Middle School Student’s Achievement
...Show More Authors

Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Oct 12 2022
Journal Name
College Of Islamic Sciences
TAQWA "Piety", TAWAKKUL "Trusting” AND NIYYAH "Intention" ARE AMONG THE FACTORS OF ADJUSTMENT
...Show More Authors

Abstract:-

The title of the thesis (TAQWA "Piety", TAWAKKUL "Trusting” AND NIYYAH "Intention" ARE AMONG THE FACTORS OF ADJUSTMENT) is related to the first legislative source of Islam, the Qur’an, and highlights the positive effects while adhering to the teachings of Islamic Sharia in terms of its importance in building the individual and thus society.

In this study, the researcher follows the objective approach, which includes collecting verses that refer to the issue of piety, trust and intention, and studying the verses objectively according to the sources, language books, ethics, and so on.

I sought to give each topic important headings, then study the topic and clarify it in general, based on narrations an

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Toward a theoretical model of the terrorist personality and differentiation from psychopathic personality
...Show More Authors

The current theoretical research targeted to construct a model of terrorist personality and its differentiation from psychopathic personality . Several assumptions or theories of perspectives of psychopathic personality have been compared with the terrorist personality studies that concerned . The suggested theoretical  model is interrupting the terrorist personality . The conclusions , discussions are mentioned. Finally, recommendation is suggested .

View Publication Preview PDF