The present paper confirmed the presence of Phrynocephalus maculatus longicaudatus Haas, 1957 in Iraq and recorded the first observations of this taxon in Al-Muthanna province southwestern of Iraq. The existence of the species is yet uncertain in Iraq. The habitat and morphological characteristics of this species were reviewed.
The present study designed to determine the ethanolic extract of Cyperus rotundus on Liver in Albino Male Mice . In the present study 18 Male mice were used they divided into six groups ( 1st group consedered control group , 2nd group injected by 250 mg/ml from extract , 3th group injected by 300 mg/ml from extract , 4th group injected by 350 mg/ml from extract , 5th group injected by 400 mg/ml from extract and the 6th group injected by 450 mg/ml from extract ) . the expermint lasted for two days and the doses gived by intraperitonial injection . showed from the study results that ethanolic extract for Cyperus rotundus have negative effect on Liver tissue in 250 , 300 , 350 mg/ml concentrations when comparsion with control group . the re
... Show MoreTotal Quality Assurance Concept have appeared in Higher Education Institutions as a result of the continuous criticism for the lower quality of the outputs of these institutions and their inappropriacy to the needs of the job market. The faculty, i.e. teaching staff member, is one of the most important output for his/her responsibility to achieve the stated goals in higher education. This represents a problem that may influence the construction of society which has to limit his tasks, responsibilities, and competencies that should be found in a faculty, and evaluating his teaching profession in light of the prerequisites of the century to become an input to achieve quality assurance in Higher Education. Therefore, the present study aims
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreThis study was conducted in the College of Agriculture fields /University of Baghdad, during Autumn 2013. This study was aimed to examine the mortality rate on the all black fly stages of Acaudalerodes rachipora Singh) by the biotic fungus Beuveria bassiana. The results of a preliminary survey showed that the samples of Ziziphus spaina christi were infested by blakflies in Agriculture collage during Autumn seasons of 2013 , the presence of species of black flies A. rachipora on the lower surface of the leaf, the study aimed to study and research the effects of fungus B. bassiana on black fly A. rachipora. After six days of treatment results showed the continued superiority 106 spore / ml trends in the western, southern and
... Show MoreThe problem of divorce from the phenomena that characterized the nature of privacy,
although their impact beyond the individual to include the community as a whole, the parties
to the relationship affected by divorce caused them harm moral and material for a long time,
resulting imbalance in the personal relationship and family and social relations because of the
high divorce rates, particularly in Iraq high rates of 28690 thousand cases in 2004 to 59 515
thousand cases in 2011 and an increase of more than (100%) during the period above, and this
rise caused by aggravation of many of the problems led the reasons for social, economic and
incompatibility spouses, health and lack of reproduction, not spending The wife a
This study was carried out to evaluate the hepato-protective property of (Arachis hypogea L.) peanut skin extracts in CCl4 induced hepatotoxicity in mice. The antioxidant activity was measured utilizing 2, 2-diphenyl-1-1 picrylhydrazyl (DPPH) radical scavenging capacity. The results showed that the methanolic extract was the highest free radical scavenging activity than the aqueous extract with values (92.34 ± 0.45 and 87.62 ± 0.44) respectively in 12 mg/mL compared to 89.61 ± 0.34 for Butylated hydroxytoluene (BHT) and 93.25 ± 0.06 for vitamin C, which means that the methanolic extract of peanut skin is superior to BHT. Furthermore, the total phenolic content was analyzed by using Folin-Ciocalteu method, the amount of total phenol in a
... Show MoreIn this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (
Abstract:
Objective: The study aim is to assess knowledge of secondary schools female students regarding dysmenorrhea; find out the effectiveness of education program on secondary schools students and also to identify relationship between education program and certain variables.
Methodology: The quasi-experimental design (pretest and posttest) on one hundred students 4th year in Khawla Bint Al-Azwar secondary school for females at morning shift in Al Nasiriya City, data collection started at 4th March to 18th March 2018. A non-probability (purposive) sample of (100) students (50) student from scientific branch and (50) students from literary branch. Data have been collected through using a questionnaire modeled and made up of
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More