The Vulnerable Indian Roofed Turtle Pangshura tecta (Gray, 1831) (Testudines: Geoemydidae) occurs in the Sub-Himalayan lowlands of India, Nepal, Bangladesh, and Pakistan. Little is known about its natural history, no studies have been conducted revealing its natural predators. In this study, a group of Large-billed Crow Corvus macrorhynchos Wagler, 1827 (Passeriformes: Corvidae) was observed hunting and predating on an Indian Roofed Turtle carcass in the bank of river Kuakhai, Bhubaneswar, India. The first record of this predation behaviour is reported and substantiated by photographic evidence.
The author obtain results on the asymptotic behavior of the nonoscillatory solutions of first order nonlinear neutral differential equations. Keywords. Neutral differential equations, Oscillatory and Nonoscillatory solutions.
Fifty snails of Paropeas achatinaceum specimens were collected and classified from four areas in Baghdad-Iraq from the period between June and July, 2017. The snails were divided into two groups (each group contain 25 snails). Two environment conditions were used in this study. Natural environment considered as control and experimental environment contains Citrus sinensis (L.) roots as snail’s source food. The comparison result between snail weights in the nature and experimental environment was not significant (0.497, 95% confidence interval [CI] 0.01209–0.02309). Also, the comparison between snail weights in the nature environment and the food mean weight was significant (0.014, 95% confidence interval [CI] 0.00591-0.04109), while the
... Show MoreThe ciliate species isolated from midgut and hindgut of Rough-tailed gecko Cyrtopodion scabrum (Heyden, 1827), identified as Nyctotherus hardwickii was collected from many regions of Baghdad, Iraq. The current study deals with a description and comparison of the morphology and morphometric characters of this species for the first time in Iraq.
This paper presents a numerical simulation of the flow around elliptic groynes by using CFD software. The flow was simulated in a flume with 4m long, 0.4m wide, and 0.175m high with a constant bed slope. Moreover, the first Groyne placed at 1m from the flow inlet with a constant the Groyne height of 10cm and a 1cm thickness, and the width of Groynes equals 7cm. A submergence ratio of the elliptic Groynes of 75% was assumed, corresponding to a discharge of 0.0057m3/sec. The CFD model showed a good ability to simulate the flow around Groynes with good accuracy. The results of CFD software showed that when using double elliptic Groy
... Show MoreThe influence of Cr3+ doping on the ground state properties of SrTiO3 perovskite was evaluated using GGA-PBE approximation. Computational modeling results infered an agreement with the previously published literature. The modification of electronic structure and optical properties due to Cr3+ introducing into SrTiO3 were investigated. Structural parameters assumed that Cr3+ doping alters the electronic structures of SrTiO3 by shifting the conduction band through lower energies for the Sr and Ti sites. Besides, results showed that the band gap was reduced by approximately 50% when presenting one Cr3+ atom into the SrTiO3 system and particularly positioned at Sr sites. Interestingly, substituting Ti site by Cr3+ led to eliminating the band ga
... Show MoreThe education sector suffers from many problems, including the scarcity of schools that can absorb the increasing number of students in light of the increasing population growth rate, as some regions suffer from a lack of opening of new schools or the expansion of existing schools to increase their capacity so that attention is required. The research sought to identify the level of maturity of project management at the research site (Building Department in Al-Karkh I/ Ministry of Education) Being responsible for educational projects and their implementation and to know that, the ten areas of the knowledge guide to project management PMBOK have been adopted according to the PM3 model (one of the models of maturity
... Show MoreThe present study reports Morchella conica Pers.1818, which belongs to the family, Morchellaceae as a new record of Iraqi macromycota based on the morphological and molecular methods. During their short and often sporadic fruiting season, this fungal species was found in mixed forest unburned areas in Branan ranges (Suliamaniya Province, Northeast Iraq). Currently, M. conica is the second Morchella species reported from Iraq. The current study aimed to introduce this new record, which is poorly studied in the Middle East. M. conica is morphologically described and phylogenetically confirmed. The relationship between this species and other species within the genus was studied using the nrDNA ITS sequences from different species and divers
... Show MoreExternal Morphologicalstudy of species DiplacodestrivialesRambure of family :
Libellulidae from suborder Anisoptera of the order Odonata which were collected from
Maisan Governorate 2010.
such study was included : Detailed description of most body parts (Head,
Thorax,Abdomen and their appendages), identification and recognition of species, study male
and female genitalia. The species Diplacodes Triviales Rambure was new record to Iraqi
fauna of Odonata.
In 2010, the tomato leaf miner Tuta absoluta (Meyrick, 1917) was reported for the first time in Iraq. The larvae can feed on all parts of tomato plants and can damage all the growth stages. The main host plant is tomato, Lycopersicon esculentum, but it can also attack other plants in Solanaceae family. In this study it was found attacking alfalfa plants, Medicago sativa in Baghdad Province. This finding reveals that alfalfa also serves as a host plant for T. absoluta in Iraq.
The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show More