One eighth of the bird species in the world is considered globally threatened; the avifauna of Iraq comprises 409 species and is considered as the major indicator of the health of Iraq’s biological resources. The Iraqi geography falls into five main regions among which is the desert and semi-desert areas which cover much of the country area. Al-Najaf desert is still one of the poorly known regions from the biodiversity point of view. Birds of conservation concern are detected in Al-Najaf desert during 31 field trips to 20 sites conducted from August 2018 to April 2020, (citing literature records, and personal interviews with locals).The factors caused the bird numbers to decline in Al-Najaf desert include hunting and trapping, logging, invasive species, and climate change.
Nine birds are found threatened with 3 EN and 6 VU comprising Saker Falcon Falco cherrug Gray, 1834 (Falconidae, Falconiformes), Red-footed Falcon Falco vespertinus Linnaeus, 1766 (Falconidae, Falconiformes), Steppe Eagle Aquila nipalensis Hodgson, 1833 (Accipitridae, Accipitriformes), Egyptian Vulture Neophron percnopterus (Linnaeus, 1758) (Accipitridae, Accipitriformes), Greater Spotted Eagle Aquila clanga (Pallas, 1811) (Accipitridae, Accipitriformes), Marbled Teal Marmaronetta angustirostris (Ménétrés, 1832) (Anatidae, Anseriformes), Macqueen's Bustard Chlamydotis macqueeni (Gray, 1834) (Otididae, Otidiformes), Turtle Dove Streptopelia turtur (Linnaeus, 1758) (Columbidae, Columbiformes), and Southern Grey Shrike Lanius meridionalis aucheri Bonaparte, 1853 (Laniidae, Passeriformes). It is concluded that Al-Najaf desert is a region of top priority area for biodiversity conservation as it hosts large number of threatened bird species.
This research is devoted to study the strengthening technique for the existing reinforced concrete beams using external post-tensioning. An analytical methodology is proposed to predict the value of the effective prestress force for the external tendons required to close cracks in existing beams. The external prestressing force required to close cracks in existing members is only a part from the total strengthening force.
A computer program created by Oukaili (1997) and developed by Alhawwassi (2008) to evaluate curvature and deflection for reinforced concrete beams or internally prestressed concrete beams is modified to evaluate the deflection and the stress of the external tendons for the externally strengthened beams using Matlab
The heavy metal cadmium is extremely harmful to both humans and animals. Zinc supplementation protects the biological system and reduces cadmium-induced toxicity. This study aimed to determine whether zinc chloride (ZnCl2) could protect male mice with the damaged liver induced by cadmium chloride (CdCl2). The protective role of zinc chloride and expression of the metallothionein (MT), Ki-67, and Bcl-2 apoptotic proteins in hepatocytes were studied after subchronic exposure of mice to cadmium chloride for 21 days. Thirty male mice were randomly categorized into 6 groups (5 mice/group) as follows: a control group that did not receive any treatment, a group given ZnCl2 at 10 mg/kg alone, and two groups received ZnCl2 (10 mg/kg) i
... Show MoreNatural Language Processing (NLP) deals with analysing, understanding and generating languages likes human. One of the challenges of NLP is training computers to understand the way of learning and using a language as human. Every training session consists of several types of sentences with different context and linguistic structures. Meaning of a sentence depends on actual meaning of main words with their correct positions. Same word can be used as a noun or adjective or others based on their position. In NLP, Word Embedding is a powerful method which is trained on large collection of texts and encoded general semantic and syntactic information of words. Choosing a right word embedding generates more efficient result than others
... Show MoreThis paper presents a proposed neural network algorithm to solve the shortest path problem (SPP) for communication routing. The solution extends the traditional recurrent Hopfield architecture introducing the optimal routing for any request by choosing single and multi link path node-to-node traffic to minimize the loss. This suggested neural network algorithm implemented by using 20-nodes network example. The result shows that a clear convergence can be achieved by 95% valid convergence (about 361 optimal routes from 380-pairs). Additionally computation performance is also mentioned at the expense of slightly worse results.
In this paper, we introduce and study the concept of S-coprime submodules, where a proper submodule N of an R-module M is called S-coprime submodule if M N is S-coprime Rmodule. Many properties about this concept are investigated.
Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called s- closed submodule denoted by D ≤sc W, if D has no proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In this paper, we study modules which satisfies the ascending chain conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.
Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.
Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm in order to remove these weakness points, Will be generated dynamic substitution box (S-B
... Show MoreThe global food supply heavily depends on utilizing fertilizers to meet production goals. The adverse impacts of traditional fertilization practices on the environment have necessitated the exploration of new alternatives in the form of smart fertilizer technologies (SFTs). This review seeks to categorize SFTs, which are slow and controlled-release Fertilizers (SCRFs), nano fertilizers, and biological fertilizers, and describes their operational principles. It examines the environmental implications of conventional fertilizers and outlines the attributes of SFTs that effectively address these concerns. The findings demonstrate a pronounced environmental advantage of SFTs, including enhanced crop yields, minimized nutrient loss, improved nut
... Show MoreLet R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if
the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are introduced and given some properties .