A total of 228 domestic and wild animals, including sheep, goats, cows, buffaloes, camels, horses, donkeys, dogs, cats, wild hares, Asiatic jackals, and red foxes were examined for ixodid ticks in the central region of Iraq. Nine species of ixodid ticks belong to two genera namely Hyalomma anatolicum Koch, 1844, H. excavatum Koch, 1844, H. turanicum Pomerantsef, 1946, H. scupense Delpy, 1946, H. dromedarii Koch, 1844, H. schulzei Olenev, 1931, Rhipicephalus annulatus (Say, 1821), R. turanicus Pomerantsef & al., 1940 and R. leporis Pomerantsef, 1946 were recovered. Their distribution among hosts and infestation rates were discussed with the pertinent literature.
Nations are developed with education and knowledge that raise the status of society in its various segments, beyond that it leads to underdevelopment and deterioration in various sectors, whether economic, health, social, etc. If we considered the general name of The ministry of Education & Scientific Studies, then the second part seems to be not functioning, since scientific research has no material allocation and remains based on the material potential of the university professor. As for the first half of the topic, the reality of the situation reveals problems related to the Holy Trinity of Education which is (Professor - Student - the scientific method) where universities suffer at the present time from this problem, and
... Show MoreThe fauna of bees (Hymenoptera, Apoidea) from different regions of Iraq is surveyed in this study; there were 16 species, 13 genera that belong to four families which are collected in this investigation.
Also, all the species that are recorded for Iraq in previous investigations are revised; totally there are 110 species, 32 genera belonging to five families: Apidae, Andernidae, Colletidae, Halictidae and Megachilidae were listed.
This study aimed to conduct a comparative analysis of seven calliphorid species of third- instar larvae that were collected from central Iraq. The purpose was to morphologically characterize these species and develop an identification key to differentiate them from closely related species. Scanning Electron Microscope (SEM) graphical images and high-resolution traditional optical microscopes were used to analyze the morphological characteristics of the species Calliphora vomitoria (Linnaeus, 1758), C. vicina Robineau-Desvoidy, 1830, Chrysomya albiceps (Widemann, 1819), Ch. rufifacies (Macquart, 1844), Ch. megacephala (Fabricius, 1794), Lucilia cuprina (Wiedemann, 1830), and L. sericata (Meigen, 1826). An identification key was const
... Show MoreThis work includes a detailed description of the Leucostoma nigricorpuris sp. nov. from
Iraq. Locality, host plants and data of collection were given.
One eighth of the bird species in the world is considered globally threatened; the avifauna of Iraq comprises 409 species and is considered as the major indicator of the health of Iraq’s biological resources. The Iraqi geography falls into five main regions among which is the desert and semi-desert areas which cover much of the country area. Al-Najaf desert is still one of the poorly known regions from the biodiversity point of view. Birds of conservation concern are detected in Al-Najaf desert during 31 field trips to 20 sites conducted from August 2018 to April 2020, (citing literature records, and personal interviews with locals).The factors caused the bird numbers to decline in Al-Najaf desert include hunting and trapping, logging,
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreTanuma and Zubair formations are known as the most problematic intervals in Zubair Oilfield, and they cause wellbore instability due to possible shale-fluid interaction. It causes a vast loss of time dealing with various downhole problems (e.g., stuck pipe) which leads to an increase in overall well cost for the consequences (e.g., fishing and sidetrack). This paper aims to test shale samples with various laboratory tests for shale evaluation and drilling muds development. Shale's physical properties are described by using a stereomicroscope and the structures are observed with Scanning Electron Microscope. The shale reactivity and behavior are analyzed by using the cation exchange capacity testing and the capillary suction test is
... Show MoreThis research aims to explain the effect of the imported inflation (which moves through the raise of global prices to Iraqi economy) over local prices, besides, the recognition the most important channels of imported inflation moving, its causes, effects, ways and policies that reduce the negative effects. To achieve the research aim, the deductive approach was adopted through using descriptive method to describe and determine phenomenon. The most important conclusion is that the research found out that there are two channels to transmission imported inflation in world. The first channel is the direct channel (prices) and the second channel is the indirect (income). The most important recommendation is to create sovereign fund (O
... Show More