A total of 45 voucher specimens of falcons which are deposited in the bird's collection of the Iraq Natural History Research Center and Museum (INHM) were reviewed. Mummified falcons were preserved as voucher study specimens and tagged with museum collection labels. In the current study, morphometrics of six species of the genus Falco Linnaeus, 1758: Lanner falcon F. biarmicus Temminck, 1825; Sacker Falcon F. cherrug Gray, 1834; Lesser Kestrel F. naumanni Fleischer, 1818; Peregrine Falcon F. peregrines Tunstall, 1771; Eurasian Hobby F. subbuteo Linnaeus, 1758 and Common Kestrel F. tinnunculus Linnaeus, 1758 were documented. These species were recorded previously in the ornithological literatures by several authors and deposited in the museum collection; nevertheless, breeding and migrating of these birds are still occurring throughout Iraq. Furthermore, the current distribution ranges and conservation status of each of the mentioned species throughout Iraq were reviewed and comprehensively discussed.
This study aimed to clarify the provisions of taking the mother for breastfeeding in Islamic jurisprudence, a comparative study between doctrines of jurisprudence. The ruling on forcing the mother to breastfeed, and the ruling on taking the mother for breastfeeding while she is in the infallibility of her husband, as well as in several reactionary divorces, and the ruling on breastfeeding in several divorced divorces. On breastfeeding in infallibility Face, as well as a several divorce reactionary, and worth the fare which is in several final divorces, and after the end of the marital relationship, has been proposed a number of recommendations, including it, is recommended to teach the provisions of the mother taking the taxi on breastfe
... Show MoreThere is no adopt in the importance of the optical communications in scientific civil and military applications because of it’s simplicity in manufacturing and it's low cost. The method of optical communication depends upon bearing the light beam the translated informations by a method called the light modulation. This method depends upon changing some light properties as frequency, amplitude and pulse duration according to the translating informations. The changes in the first two properties are concerned optically with the analog modulation while the third one concern at most with digital modulation. All past methods are expensive with low efficiency and needs electrical or magnetic fields. In this technique the source of voice used
... Show MoreHighway network could be considered as a function of the developmental level of the region, that it is representing the sensitive nerve of the economic activity and the corner stone for the implementation of development plans and developing the spatial structure. The main theme of this thesis is to show the characteristics of the regional highway network of Anbar and to determine the most important effective spatial characteristics and the dimension of that effect negatively or positively. Further this thesis tries to draw an imagination for the connection between highway network as a spatial phenomenon and the surrounded natural and human variables within the spatial structure of the region. This thesis aiming also to determine the natu
... Show MoreConstructing The Psychological Tranquility Scale of the University of Baghdad Students
The research aimed to :
- Constructing the Psychological Tranquility Scale of the University of Baghdad Students.
- Appointing the psychological content standard for the accepting Answer of student about the scale.
The research Sample was (414) boy and girl from Baghdad University Students for the Studying year (2008-2009), So the Scale of the Psychological Tranquility Scale was bilt on them in good psychometric properties from truth Factor analyzing which was its super saturation was reached to (50) item from its items a value more than the super sutution norm (0,30) for kaizer, also the firm value was Relaibility for the scale by the way
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreThe research aims to determine the role of the training strategy with its dimensions of (strategic analysis, formulation of training strategy, implementation of training strategy, evaluation) in the pioneering performance of the organization with its dimensions of (pre-planning , renewal and modernization, efficiency, effectiveness). Important and modern in pioneering performance and training strategy, and in recognition of the importance of the subject and the expected results of the surveyed banks, an analysis was made of the data obtained through field visits in addition to the questionnaire and interviews ,and the most prominent results that were reached were taking the research sample into consideration all the requirements of the trai
... Show MoreThe present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This
... Show MoreIn this paper, a new approach was suggested to the method of Gauss Seidel through the controlling of equations installation before the beginning of the method in the traditional way. New structure of equations occur after the diagnosis of the variable that causes the fluctuation and the slow extract of the results, then eradicating this variable. This procedure leads to a higher accuracy and less number of steps than the old method. By using the this proposed method, there will be a possibility of solving many of divergent values equations which cannot be solved by the old style.
MR Younus, Nasaq Journal, 2022