This paper reviews the distribution range of wild goat Capra aegagrus (Erxleben, 1777) in Iraq with new sighting of very small herd of wild goat occur in Alqosh mountain, north of Nineveh province, where wild goat have a little informations on the distribution areas in Iraq according to the Red List of the International Union for Conservation of Nature (IUCN).
United nation determined many basic climatic effects which affect the crust of Earth.
And the most important one is the climatic change and its effect on environmental, economic,
social, and political effects. So, the amount of rain which is considered as one of climatic
changes in Iraq should be studied.So, this research explains the factors which affect rain, its
overall average, the variation in the amounts of rain, the amount of yearly rain and variation
in both yearly and monthly rains by using standard variation and yearly fluctuation.As a
result, it is concluded that the number of rainy days doesn't mean an increase in rains amount.
And there's variation in rains amount in all study areas which is contrastive
Polish Academy of Sciences
This research paper is about synoptic climate specifically with in the upper air layers
using upper air layers maps analysis which are maps of thickness for the level 1000 – 500
MB, that their high average ranges between 100 – 5600 M above surface. This research paper
focuses on studying special and temporal variations of the atmosphere thickness above Iraqaccording
to this study, it is concluded that atmosphere thickness above Iraq increases
towards south with an average of 100 M as compared with north of Iraq. Regarding the
temporal variations, it is concluded that atmosphere thickness during hot months. In July, for
example, the atmosphere thickness becomes thicker than in January with an average of
(250)M
Construction projects have a special nature and affect them many factors making them exposed to multiple risks as a result of the length of the implementation period and the multiplicity of stages, starting from the decision stage through implementation until the final delivery, which leads to increased uncertainty and the likelihood of risk.
The process of analysis and risk management is one of the effective and productive methods that are used in managing the construction projects for the purpose of increasing the chances of ending the project successfully in terms of cost, time and quality and at the lowest possible problems.
The research aims first to the effective planning for analysis and risk managemen
... Show MoreThe transition states that Iraq economy lived it after 2003, and the change in tools used by monetary policy based on C.B.I law 56 in 2004, under the especially situation for the economy (structural imbalances and the weakness of banking & financial sector).
The monetary policy adopted the inflation targeting policy to mantain the monetary stability in the economy and considered it an incubator for future growth. It used the exchange rate as a nominal anchor to achieve the goal (because the rentier of economy, finance Shallowness & separation between real sector and finance sector, all this cause the normal channel to transfer the effect of monetary policy (interest rate) ineffective.
... Show Moreيهدف البحث إلى التعرف على The research aims to identify the effect ofاثر التركيب العمري للسكان على الناتج المحلي الإجمالي في العراق وتحديد الفئات العمرية من أطفال ومنتجين أي من هم في سن العمل والمسنين لأهمية ذلك لإغراض التخطيط الاقتصادي.إنeffectofeee age structure of the population on GDP in Iraq and determine the age groups of children and any of the producers wham are of working age and the elderly of the importance for the purposes of economic planning. نسبة الفئة العمرية Proportion of the age group (00- -4 4سنوات اقتربت من
... Show MoreTwenty-two of the Starling Sturnus vulgaris Linnaeus, 1758 were collected in Baghdad city during the period from January to September, 2014, and examined for endoparasites. Ten (45.45%) were found infected with either the cestode Passerilepis crenata (Goeze, 1782) (31.81%) or the nematode Dispharynx nasuta (Rudolphi, 1819) (13.63 %). Morphometric and meristic features for these worms were expressed. D. nasuta is recorded here for the first time from S. vulgaris for Iraq.
If the sovereignty of the state is reflected in the taxation of its citizens, this sovereignty can not be completed and completed only if it works on its part to collect its debts, whether voluntary or compulsory, and the debt of the debt arises from the will of the individual and the will of the state alone, The existing management of seizure and collection is based on an unequal relationship between the State and the debtor from which the obligation arises. Naturally, this relationship has obligations and rights on both parties. The researcher used a set of studies and previous research, books and other sources related to the subject of research. This was done through the theoretical and practical aspects, which focused on direct and i
... Show MoreThe study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the