Environmental factors that damage plant cells by dehydrating them, such cold, drought, and high salinity, are the most common environmental stresses that have an impact on plant growth, development, and productivity in cultivated regions around the world. Several types of plants have several drought, salinity, and cold inducible genes that make them tolerant to environmental challenges. The purpose of this study was to investigate several species in
هدفت الدراسة لالقاء الضوء على وضع المرأة في التعليم العالي في العراق خلال الاعوام الدراسية: 2008 - 2009, 2010 – 2011 و2011- 2012. تتيح القوانين والتعليمات في التعليم العالي في العراق فرص متكافئة للاناث والذكور للتسجيل في الدراسات الاولية والعليا، وكذلك عدم التمييز في الرواتب الشهرية للمنتسبين وفقا لنوع الجنس (الجندر ). بلغ متوسط عدد الاناث في مرحلة الدراسة الاولية في مؤسسات التعليم العالي في العراق لثلا
... Show MoreContamination of the operating theatre is a major cause of nosocomial infection. This report aimed to show the types of microorganisms and their percentages cultivated from operating theatres of 16 health directorates of 14 Iraqi governorates (3 health directorates in Baghdad and 1 in each other 13 governorates) that was reported to the Pollution Control Section at Ministry of Health in Iraq from first of January to the end of June 2018. The data of all health directorates have included cultivation taken from governmental and private hospitals. Duhok, Erbil, Sulaymaniyah, and Nineveh were not involved in this report due to unavailability of their data during the above period. Escherichia coli, Pseudomonas aeruginosa and Staphylococcus aureu
... Show MoreI came back and made my jewelery from the first research or studies known to man, and the oldest era and confirmed the problem of searching for the links of sweets and admiration of the magnificence of the effectiveness of the search for the importance of preserving the heritage of the Iraqi civilization in its original creative aspects. Metal in Iraq, Head Costume, Neck Costume, Party Costume (Hands and Legs). The main results of the research were;
1-Contemporary folk jewelry in Iraq was characterized by design units for use.
Dependence in the feed industry in the form of laboratory mold.
The purpose of this paper is to investigate the adaptations that have been made to traditional courtyard houses (TCHs) in Baghdad, Iraq. The aim is to develop an understanding of various factors in the adaptation of these buildings to suit contemporary lifestyles, which will contribute to the wider field of building adaptability.
Empirical evidence was collected through case studies of 12 TCHs in the Al-Kadhimiya area of Baghdad, which involved a physical survey of buildings and semi-structured interviews with 24 occupants.
Two dwarf snakes were discovered, Eirenis thospitis Schmidtler & Lanza from Sereen mountain, north east of Arbil and E. rothii Jan from Saffin mountain North of Arbil city North of Iraqi Kurdistan. Supported by description and important notes on variation. In addition summarized list for 9 species of the genus Eirenis Jan in Iraq is also presented.
حصاة الحالب واعراضها تؤثر على حياة المريض بصوره سلبيه، عدة علاجات متوفرة لعلاج حصاة الحالب من ضمنها مراقبه المريض، استخدام ادويه تفتيت الحصاة، استخدام موجات الفوق الصوتية تفتيت الحصاة بناظور الحالب، استخراج الحصاة جراحيا او بالناظور البطني, استخدام ناظور الحالب وتفتيت الحصاة بالليزر هي الطريقة المفضلة لعلاج حصاة اسفل الحالب. الهدف من الدراسة:لمقارنه تأثير ومضاعفات استخدام تقنيه الطحن او تقنيه التكسي
... Show More|
Building Information Modeling (BIM) is becoming a great known established collaboration process in Architecture, Engineering, and Construction (AEC) industry. In various cases in many countries, potential benefits and competitive advantages have been reported. However, despite the potentials and benefits of BIM technologies, it is not applied in the construction sector in Iraq just like many other countries of the world. The purpose of this research is to understand the uses and benefits of BIM for construction projects in Iraq. This purpose has been done by establishing a fr |
A total of 47 species belonging to 46 genera, 34 subfamilies, 23 families and 7 orders of predator and parasitoid insects were collected and identified. The survey was conducted throughout the program held by the General Directorate of Agriculture-Duhok, in cooperating with the College of Agricultural Engineering Sciences in Duhok Province, Kurdistan Region, Iraq from May 2013 to April 2014.
The species hosts, collecting date, locality and distributions are given. The current checklist also included some species previously collected by other researchers in Duhok Province.
After the year 2003, Iraq went through multiple waves of violence and at different levels on the security, intellectual, political and social levels. Behind that stood several motives and incentives to enable violence that represented the first axis of research, the most important of which was the political motives that circulated an atmosphere that politics against society and transformed power into a field of political brutality against the individual and the group at once. There are also cultural, intellectual, media and economic motives such as weak cultural independence, poverty, marginalization, unemployment and want, and the absence of a media discourse that rejects violence but incites it, on the other ha
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More