Mammals are under threat worldwide due to deforestation, hunting, and other human activities. In Iraq, a total of 93 species of wild mammals have been recorded including species with global conservation concern. Bamo Mountain is situated within the Zagros Mountains in northern Iraq which is a suitable habitat for wild mammals. Due to scarcity of the field survey efforts and cryptic behavior, monitoring of the wild mammals fauna in Zagros Mountain seems challenging. Therefore, we used a camera trap which seems to be an ideal way to determine species diversity of wild mammals in Bamo Mountain. Moreover, interviews with local villagers were performed. The mammalian diversity of Bamo Mountain is not fully explored but seemed threatened by local extinction due to poaching and wildlife trafficking, minefields, and annual fires.
In this study, a total of eight species of wild mammals were recorded for the first time in Bamo Mountain using camera trap method including the Persian leopard Panthera pardus saxicolor Pocock, 1927, and the Wild goat Capra aegagrus Erxleben, 1777, flagship and key species of conservation concern. As far as it is concerned, the major threats on the wild mammals were discussed and some important points were highlighted towards the establishment of the protected area in Bamo Mountain.
Background: The estimation of ferritin and related variables by complete serum iron profile, for Iraqi hashimoto’s patients to see the effect of thyroid hormone insufficiency, which may lead to deficiency of ferritin iron stores, this may be quite useful during the diagnosis and treatment of hashimoto’s patients. Patients and Method: The study was performed at National Center of Teaching laboratories of Medical city institute in Baghdad. Fifty newly diagnosed patients with hashimoto’s and forty apparently healthy controls. Diagnosis based on thyroid profile analysis including:Thyroid Stimulating Hormone (TSH), Thyroxine (totalT4) and Triiodothyronine (total T3), estimation of antibodies against thyroperoxidase, iron profile including:
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MorePredicting vertical stress was indeed useful for controlling geomechanical issues since it allowed for the computation of pore pressure for the formation and the classification of fault regimes. This study provides an in-depth observation of vertical stress prediction utilizing numerous approaches using the Techlog 2015 software. Gardner's method results in incorrect vertical stress values with a problem that this method doesn't start from the surface and instead relies only on sound log data. Whereas the Amoco, Wendt non-acoustic, Traugott, average technique simply needed density log as input and used a straight line as the observed density, this was incorrect for vertical computing stress. The results of these methods
... Show MoreOptimum allocation of water for restoration of Iraqi marshes is essential for different related authorities. Abo-Ziriq marsh area about 120 km2 is situated 40 km east of Al-Nassryia city. After comparing the measured annual water qualities with the Iraqi standards for surface water quality evaluation, Abo-Ziriq marsh water quality was in acceptable limit. Hydro balance computation were done for each month by using interface among the HEC-RAS, HEC-GeoRAS and ArcView GIS software and built a number of eco-hydro relationships to simulate the marsh ecosystem by using HEC-EFM program to estimate water allocation adequate for ecosystem requirement and constructs a GIS hydraulic reference map to show inundation area, depth grid and velocity dis
... Show MoreIn this study an experimental work was done to study the possibility of using aluminum rubbish material as a coagulant to remove the colloidal particles from oily wastewater by dissolving this rubbish in sodium hydroxide solution. The experiments were carried out on simulated oily wastewater that was prepared at different oil concentrations and hardness levels (50, 250, 500, and 1000) ppm oil for (2000, 2500, 3000, and 3500) ppm CaCo3 respectively. The initial turbidity values were (203, 290, 770, and 1306) NTU, while the minimum values of turbidity that have been gained from the experiments in NTU units were (1.67, 1.95, 2.10, and 4.01) at best sodium aluminate dosages in milliliters (12, 20, 24, and 28) for
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.