The present study has examined the spatiotemporal varieties of the demographics of the Shatt Al-Arab River fishes and their relation to some ecological components. The aim is to forecast these groups in the unexplored parts of the waterway with an emphasis on environmental indices of diversity. Three sites in the river were selected as an observation and study of these species, which lasted from March 2019 to February 2020, the study dealt with factors affecting fishes, as Water Temperature (WT), Dissolved Oxygen (DO), Potential Hydrogen Ion (pH), Salinity (Sal), and Transparency (Tra). Gill nets, cast nets, hooks, and hand nets were adopted to collecting fish. The results indicated that the fish population comprises 60 species representing 13 orders, 28 families, all species belonged to Osteichthyes except for one (Carcharhinus leucas) which belonged to Chondrichthyes. Cyprinidae is the prevalent family embraced by nine species. WT (12.1- 33.4°C) has a considerable influence on the total number of species and individuals to the north of the watercourse. However, salinity (0.9- 8.7 mg/L) was regarded as the essential impact on the composition, distribution, and abundance of species in the rest sites. Planiliza abu was the most abundant species attaining 20.21%, followed by Oreochromis aureus (16.41%), and Carassius auratus ranked (15.92%), the dominance (D3) value was 52.54%. The results of the current study showed that most of the diversity index values are considered a moderate status. On the other hand, the majority of the richness index values are viewed as semi disturbed status in all stations, while most of the values recorded of the evenness index are deemed as semi-balanced status. The application of GIS technique by using the ordinary kriging method showed high efficiency in the Shatt Al-Arab River. Therefore, this technique can be employed in environmental studies of fishes.
The Sebkha of geomorphological aspects of evaporative where climate leads active role, which forms part of the earth's surface in the form of Iraqi Mesopotamia plain who of the most fertile land, and because of natural factors and human Common turned most of the arable land to the territory of Sebkha. It was to determine the exact geomorphological associated of Sebkha formats by field work such as: Alnbaka, lakes, salt flats, and other forms of Small is: bridges salt, mud cracks, salt ponds, Rectangles and polygons salt, Sahaf salt, salt domes, salt gravel, bumps saline (salt points), Ash salt, salt bows, in detail and accurately documented Terrestrial Photogrammetry field and were compared to the levels and standards varieties have been
... Show MoreThe research aims to measure the accounting conservatism practice of listed companies in the Iraq stock exchange using Basu model to measure the degree of accounting conservatism in a sample of companies of (21) companies for the period from 2007 to 2011, the researcher found that most of the listed companies in the market exercised accounting conservatism when measurement and disclosure of the result of the activity and financial position and there is a variation in the degree of accounting conservatism between economic sectors , which included banking , investment , insurance , industry , agriculture , tourism and hotels.
Because the practice of accounting conservatism properly
... Show MoreThis study Studied Ministry of Hamdy Al-Buchachy(the first)and explain the features of
this Ministry in a critical time in the history of Iraq. The second world war had began and its
end had reached .The political situation in Iraq is so complicated. The Ministry had made
many things. The Ministry had situated in internal and external complicated time. The
situation in Iraq was so difficult, therefore the recommendor (Abdul-Ilah)asked Hamdy Al-
Bachachy to make be the head of the new governments Al-Bachachy had made irrelevant
government, thus it didn’t last more than three months and the British governorate and of
direct in terference in Iraq who worked to reduce the Iraqi army and the Minister of Defence
refus
In this work, using GPS which has best accuracy that can be established set of GCPs, also two satellite images can be used, first with high resolution QuickBird, and second has low resolution Landsat image and topographic maps with 1:100,000 and 1:250,000 scales. The implementing of these factors (GPS, two satellite images, different scales for topographic maps, and set of GCPs) can be applying. In this study, must be divided this work into two parts geometric accuracy and informative accuracy investigation. The first part is showing geometric correction for two satellite images and maps.
The second part of the results is to demonstrate the features (how the features appearance) of topographic map or pictorial map (image map), Where i
The implementation of decentralization in Iraq was asymmetrical, leading to different forms and paces of implementation. Comparing four cases of Basra, Kirkuk, Nineveh, and Sulaymaniyah indicate that these cases differ in their political stability and autonomy in a way that led to a different forms of decentralization. This paper argues that the higher the level of political autonomy from the federal government, the more efficient the governance model, and the more efficient the governance model, the more legitimate the system (trust), and the more legitimate a system, the more accountable elected officials. Therefore, it recommends reforming the institutional setup of decentralization by having districts, instead of provinces, as the bu
... Show Moremethodology six sigma Help to reduce defects by solving problems effectively, and works Lean to reduce losses through the flow of the manufacturing process and when integrating these two methodologies (Lean and six sigma), the methodology of Lean six sigma will form the entrance to the organizers of the optimization process and increase the quality and reduce lead times and costs . by focusing on the needs of the customer. this process uses statistical tools and techniques to analyze and improve processes.
We have conducted this research in the General Company for Electrical Industries and adopted its product (machine cooling water three taps) as a sample for research. In order to determine t
... Show MoreAbstract
Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built t
... Show MoreThe non static chain is always the problem of static analysis so that explained some of theoretical work, the properties of statistical regression analysis to lose when using strings in statistic and gives the slope of an imaginary relation under consideration. chain is not static can become static by adding variable time to the multivariate analysis the factors to remove the general trend as well as variable placebo seasons to remove the effect of seasonal .convert the data to form exponential or logarithmic , in addition to using the difference repeated d is said in this case it integrated class d. Where the research contained in the theoretical side in parts in the first part the research methodology ha
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show More