The present study introduces description of a new species of genus Arboridia Zakhvaticin 1946, based on a large collection of Cicadellids. External morphological characters particularly male genitalia were discussed and illustrated. The genus Arboridia Zalchvatkiia (Typhlocybinae: Erythroneurini) contains small slender, fragil and attractively coloured and patterned leafhoppers. It was erected by Zakhvatkin in 1946 (Zalchvatkin, 1946). The overall length of adults ranges from 2.5 to 3.4 mm. Members of this genus can be recognized by inner apical cell of forewing which is long with oblique base; Cu confluent with this base at a point near the middle of the length of inner apical cell; two prominent circular deep brown spots on vertex (Zalchvatkin, 1946; Young, 1952 and Lequesne & paynr, 1981). The taxonomic status of this genus in Iraq is still poorely studied, the first taxonomic work was made by Gliatui (1964), who described and illustrated Arbooridia hussaini as a new species.
Variation in the numbers of pectoral fin spines and rays, pelvic fin rays, gill rakers on the first gill arch, anal fin rays, and the number of vertebrae of Silurus triostegus Heckel were examined in specimens from 16 localities that span its entire distribution range in the Tigris, Euphrates, and Shatt al-Arab rivers in Iraq. The mean number of the six meristic traits increases toward high latitudes with maximum and minimum values in the north and south of Iraq. Based on cluster analysis and PCA, the Mesopotamian river samples were clearly separated into three distinct groups. The upper Tigris populations were isolated from those of the middle and southern populations of this river and from those of
The paper deals with claims in construction projects in Iraq and studies their types, causes, impacts, resolution methods and then proposes a management system to control the impacts of claims. Two parts have been done to achieve the research objective (theoretical part and practical part). The findings showed that the main types of the claims are extra work claims, different site condition claims, delay claims and the main causes of the claims are variation of the orders, design errors and omission, delay in payments by owner, variation in quantities and scheduling errors. The claims have bad impacts on the cost by increasing (10% to 25%) and also on the duration of the project by increasing from (25% to 50%).The negotiation is the main
... Show More......
The Iraqi government seeks to overcome the financial crisis by investing and privatizing some projects to achieve sustainable growth. Most of the investment projects in Iraq suffer from many constraints that greatly impact the success of these projects. A survey of the opinions of a group of experts was conducted to identify the most important constraints facing the investment process in Iraq. Then the experts' answers were arranged in a closed questionnaire and distributed to the research sample for which the statistical analysis was conducted. Through it, the most important (17) factors that had the greatest impact on the failure of investment projects in Iraq were reached. One of the main constraints was
... Show MoreA new copolymer (MFA) was prepared from condensation of melamine (M) with p- methyl – anisole (A) in the presence of condensation agent like 37% (w/v) of formaldehyde. The new copolymer was characterized by elemental, IR and HNMR spectra. The chelating ion-exchange property of this polymer was studied for methylene blue dye in aqueous solution in 100-200ppm concentrations. The adsorption study was carried out over a wide range of pH, shaking time and in media of various kinetic parameters models. Thermal parameters like enthalpy, entropy and Gibbs free energy of adsorption process of methylene blue on surface of MFA resin were determined on the basis of kinetic parameters at different temperatures. To describe the equilibrium of adsorp
... Show MoreIn this work, thiadiazole derivatives were prepared by taking advantage of active sites in (2-amino-5-mercapto-1, 3, 4-thiadiazole) as a starting material base. The main heterocyclic compounds (1, 3, 4-thiadiazole, oxazole) etc, 2-amino-5-mercapto-1,3,4-thiadiazole compound (1) was prepared by cyclic closure of thiosemicarbazide compound with anhydrous sodium carbonate and carbon disulfide. Oxidation of (1) via hydrogen peroxide, to have (2) which was treated with chloro acetyl chloride to get (3). Preparation of thiazole ring (4) was from reacting of (3) with thiourea. Synthesis of diazonium salts (5) from compound (4) using sodium nitrite and HCl. Compound (5) reacted with different ester compounds to prepare a new azo compounds (6–8).C
... Show MoreThe purpose of my thesis is to synthesis two new bidentate ligands which were used to prepare series of metal complexes by reacting the ligands with (M+2 = Mn, Co, Ni, Cu, Cd and Hg) Succinyl chloride was used as starting material to synthesis two bidentate ligands (L1) and (L2) by reaction it with 4-chloroaniline (L1) and (4-aminoacetophenone) (L2) in dichloromethane as a solvent, that are: (L1) = N1,N4-bis (4-chloro phenyl ) succinamide (L2) =N1,N4-bis(4-acetylphenyl)succinamide The new ligands were characterize by using spectroscopic study (Fourier-transform infrared spectroscopy (FT-IR), electronic spectra ( UV-Vis) ,nuclear magnetic resonance(1H,13C-NMR), Mass spectra
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show More