One eighth of the bird species in the world is considered globally threatened; the avifauna of Iraq comprises 409 species and is considered as the major indicator of the health of Iraq’s biological resources. The Iraqi geography falls into five main regions among which is the desert and semi-desert areas which cover much of the country area. Al-Najaf desert is still one of the poorly known regions from the biodiversity point of view. Birds of conservation concern are detected in Al-Najaf desert during 31 field trips to 20 sites conducted from August 2018 to April 2020, (citing literature records, and personal interviews with locals).The factors caused the bird numbers to decline in Al-Najaf desert include hunting and trapping, logging, invasive species, and climate change.
Nine birds are found threatened with 3 EN and 6 VU comprising Saker Falcon Falco cherrug Gray, 1834 (Falconidae, Falconiformes), Red-footed Falcon Falco vespertinus Linnaeus, 1766 (Falconidae, Falconiformes), Steppe Eagle Aquila nipalensis Hodgson, 1833 (Accipitridae, Accipitriformes), Egyptian Vulture Neophron percnopterus (Linnaeus, 1758) (Accipitridae, Accipitriformes), Greater Spotted Eagle Aquila clanga (Pallas, 1811) (Accipitridae, Accipitriformes), Marbled Teal Marmaronetta angustirostris (Ménétrés, 1832) (Anatidae, Anseriformes), Macqueen's Bustard Chlamydotis macqueeni (Gray, 1834) (Otididae, Otidiformes), Turtle Dove Streptopelia turtur (Linnaeus, 1758) (Columbidae, Columbiformes), and Southern Grey Shrike Lanius meridionalis aucheri Bonaparte, 1853 (Laniidae, Passeriformes). It is concluded that Al-Najaf desert is a region of top priority area for biodiversity conservation as it hosts large number of threatened bird species.
In this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreThe combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.
In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.
&n
... Show MoreThis literary review addresses the status of the most famous Israeli writer, Amos Oz, through the analysis of relevant articles that highlight various aspects of his literary and political orientations, reflecting his ideological and social background. Oz's literature encompasses a mix of political orientations that many critics view as extreme, while others see them as moderate stances indicative of the author's awareness. And these are what strengthened his literary status in modern Hebrew literature.These trends emphasized the contribution of Oz's works to shaping Israeli cultural consciousness and reflect the challenges facing identity in multiple contexts. He was an advocate for equality between Palestinians and Israelis and
... Show MoreThis research is a study of the difficulties of learning the Arabic language that faces Arabic language learners in the Kurdistan Region, by revealing its types and forms, which can be classified into two categories:
The first type has difficulties related to the educational system, the source of which is the Arabic language itself, the Arabic teacher or the learner studying the Arabic language or the educational curriculum, i.e. educational materials, or the educational process, i.e. the method used in teaching.
The second type: general difficulties related to the political aspect, the source of which is the policy of the Kurdistan Regional Government in marginalizing the Arabic language and replacing the forefront of th
... Show MoreThis paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
Let R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.
The main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.
Prosthetic hands are compensatory devices for the hand amputees as a result of injury, various accidents or birth deformities, types of prosthetic hand vary depending on the mechanism they operate and how they perform. There are common types in use that are characterized by their complex mechanisms, which are difficult for the amputee to use or exclude use because of their high cost, therefore the aim of this research is to design an artificial hand that is suitable in terms of simplicity of use and low cost and similar to a natural hand with regard to dimensions and shape that operated in the mechanism of links. This research involves Stress and strain analysis of the prosthetic hand and its fingers that modelled from (Petg CR)
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreIn this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.