The ciliate species isolated from midgut and hindgut of Rough-tailed gecko Cyrtopodion scabrum (Heyden, 1827), identified as Nyctotherus hardwickii was collected from many regions of Baghdad, Iraq. The current study deals with a description and comparison of the morphology and morphometric characters of this species for the first time in Iraq.
The purpose of this research its study of Natural Consideration that contributed in turning of Dairy products in Baghdad Governorate , this subject deal with centered geographical location in the midlle of Iraq ,it’s also main market in discharge and marketing to rest of Iraqi’s governorate pointed to it’s an active role in localized of it’s factory(milk ,cheese,cream ,butter, yoghurte)and it’s constant ,thus distributedin all district of Baghdad ,flat governorate surface encourage this industry ,also climate (temperature, wind, (it’s speed and it’s direction) ,rainfull and relative wet) also water resources and it’s influenced that nessacity of production process with important inculclusion that researcher came out throu
... Show MoreHemipteran species of alfalfa plant surveyed in Abu Ghraib, Baghdad during the months of April, May and October of 2010. The study was registered, eight species belonging to eight genera and six families. The results showed that Deracoris sp. Kirschbaum,1855 and Campylomma diversicornis Reuter, 1878 the most abundant species while Lygaeus pandurus Scop. and Pyrrhocorius apterus (Linnaeus 1758) were the lowest during the study period.
Evaluating the part of historical center in Baghdad City
Before the unit environmental problems serious the issues of the environment and conservation of contemporary issues important in the developed and developing worlds, it was natural that leads increasing global awareness to alert a group of intellectuals, scientists and politicians to the seriousness of this problem and the call to take steps deeper and more comprehensive with respect to the environment humanitarian based on the study of the various elements of this environment and a greater understanding of the relationships among them, and on this basis, steps have been taken to target the environment and to identify problems and make efforts to achieve the goals I: stop the deterioration of the environment and the second impro
... Show MoreThe cartographic representation of geographical phenomenon considers the essential base in geographical analysis since as it supports the vertical house which is apartment houses consist of apartments which represent civil phenomenon , the aim of this study is to project the rule of cartographic representation methods in geographical analysis and make comparison in economic and social aspects for two approaches , the vertical and construction building methods.
The expand of city horizontally represent a problem in itself because it leads to loss of civil lands and overpass the agricultural lands as a result ,the ratio of habitation of land usage is so large in comparison with another usages of lands of the cities ; therefore ; many co
The corrosion of low carbon steel boiler tubes in demi water had been investigated. The purpose of this investigation was to determine the change produced in corrosion behavior of the carbon steel as a result of the specific presence of chloride and copper ions in the water under different temperatures. For low carbon steel experiments, the temperature was taken in three levels (125, 175, and 215°C) under about 27 bar pressure and 1500 rpm in autoclave. Using weight loss technique, the corrosion rate ranges from (85 to 789 gmd) for low carbon steel boiler tubes.
Summary
The subject ( meaning of added verbs) is one of the main subjects
which study in morphology since in Arabic language. It is include the meaning
of each format, and the increased meaning occurred by this increment in the
verbs.
The (strain) is one of very important meaning in this subject, it takes a
wide area of morphology studies, and interesting of scientists and
researchists.
There are two famous formats for this meaning; (infa la انفع
ل ), and (ifta
la افتع
ل ). Also There are another formats for the same meaning, but less than
the first two in use, they are; (taf ala تفعّ
ل ), (tafa ala تفاع
ل ), (taf lala ) ,(تفعل
ل
ifanlala افعنلل ), (ifanla .(
In the present research we the study the deposition of radioactive elements naturally and particularly radioactive radon gas in parts of the body of organisms which are of direct relevance to human life in the city of Baghdad as the samples which were collected from the bones and skin of some kinds of birds and chicken based on the principle that radioactive elements are concentrated always on the bones. We use of this as the exercise detector impact nuclear (CR-39), using the technology Cylindrical diffusion , the results indicated that the largest concentration of radon found in the bone bird Seagull tapered as it was (625 ± 37) Bq.cm-3, and less concentration of radon gas in the chicken bones of Al-kafeel as it was (105 ± 10) Bq.c
... Show MoreOne of topics that occupied alarge area in Iraqi society at the moment is the issue( of tribal separation and its relation to the organization of the community ) so we see in the civilizations and heritage of each community aset of provisions and laws that take the form of status customary or religious it is indicative of the great interest in Iraqi society in cotrolling the behavior of individuals to comply with values and social laws and become their behavior is consistent with the behavior of the total and adhere to the social values and be productive individuals within the subject and this can only be achieved from the social co
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the