Preferred Language
Articles
/
jnhm-53
A NEW RECORD OF ZIZIPHORA SPECIES (LAMIACEAE) FOR IRAQ
...Show More Authors

    Ziziphora persica Bunge is recorded as a new Study in Iraq. This species has been collected from Jabal Sinjar in Nineveh province in the north western part of Iraq. The morphological characters, habitat and geographical distribution of the species with a key to Ziziphora L. species in Iraq have been provided.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Checklist of Aquatic Oligochaetes Species in Tigris–Euphrates River basin
...Show More Authors

A total of 60 species of aquatic oligochaetes were identified in different sites within Tigris-Euphrates basin / Iraq, including River Tigris, River Euphrates, Southern marshes ( Al-Haweiza , Al-Hammar and Al-Chebaiesh ) , Shutt Al-Germa, and Shatt Al-Arab. In River Euphrates 39 species were identified, 40 species from River Tigris and 32 species from Shatt-Al-Arab and southern marshes.The identified species were classified as four species of Family Aeolosomatidae, 54 species of Naididae ( 31 Naidinae , 8 Pristininae and 15 Tubificid worms), one species of each of Lumbriculidae ( Lumbriculus variegates ) and Lumbricidae ( Eiseiella tetraedra). Among Aeolosomatidae , Aelosoma aquaternarium, A. Liedyi, A. variegatum and A. hemprichi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Survey of some Fish Species from Different Localities in Baghdad
...Show More Authors
Abstract<p>This study is concerned with a survey of seven species belonging to seven genera under two families and two orders found in some different areas of the Tigris River, especially since these areas have not been surveyed for a long time, and an attempt to identify the existing species at the present time after the recent water scarcity of the Tigris and Euphrates rivers and all water bodies interior of Iraq and the impact of this scarcity on the fish diversity found in some areas of the Tigris River in Baghdad.</p>
View Publication
Scopus Crossref
Publication Date
Mon Aug 14 2023
Journal Name
Mammalia
First record of the Small Indian Mongoose <i>Urva auropunctatus</i> (Hodgson 1836) from Syria
...Show More Authors
Abstract<p>The Small Indian Mongoose <italic>Urva auropunctata</italic> (Hodgson 1836) is a small carnivore native to Iraq and South Asia; however, it has been widely introduced worldwide. The species has never been reported in Syria; however, it was suspected to occur in the extreme eastern parts of the country, but no confirmed records were made. In 2021–2022, several sightings were notified during <italic>in situ</italic> surveys in Deir ez-Zor Province in eastern Syria which confirm the first occurrence of the Small Indian Mongoose in the country.</p>
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Production of fibrinolytic protease from various fungal isolates and species 2.Determination of optimum conditions for enzyme production from Pleurotus ostreatus
...Show More Authors

The optimum conditions for production of fibrinolytic protease from an edible mushroom Pleurotus ostreatus grown on the solid medium , Sus medium, composed of Sus wastes (produced from extracted medicinal plant Glycyrrhiza glabra) were determined. Addition of 5% of Soya bean seeds meal in Sus medium recorded a maximum fibrinolytic protease activity resulting in 7.7 units / ml. The optimum moisture content of Sus medium supplemented with 5% Soya bean seeds meal was 60% resulting in 7.2 units / ml.Pleurotus ostreatus produced a maximum fibrinolytic protease activity when the spawn rate,pH of medium and incubation temperature were 2,6 and 30°C, respectively. The maximum fibrinolytic protease activity was 7.6 units / ml when incubat

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Integral transforms defined by a new fractional class of analytic function in a complex Banach space
...Show More Authors
Abstract<p>In this effort, we define a new class of fractional analytic functions containing functional parameters in the open unit disk. By employing this class, we introduce two types of fractional operators, differential and integral. The fractional differential operator is considered to be in the sense of Ruscheweyh differential operator, while the fractional integral operator is in the sense of Noor integral. The boundedness and compactness in a complex Banach space are discussed. Other studies are illustrated in the sequel.</p>
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science (ijeecs)
A new smart approach of an efficient energy consumption management by using a machine-learning technique
...Show More Authors

Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s

... Show More
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis of some heterocyclic derivatives of 1,8-Naphthyridine with a new substitution on the Naphthyridine ring
...Show More Authors

Abstract The Synthesis in good yields of some new 1,8-Naphthyridine derivatives (1-9) and characterized on the basis of IR and 1H NMR spectra data. The compounds (1) and (6) were utilized as a starting material for the preparing of these compounds.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Constructing a new mixed probability distribution with fuzzy reliability estimation
...Show More Authors

This paper deals with constructing mixed probability distribution from mixing exponential

Scopus (5)
Scopus
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref