In this work, the spirurid nematode Hartertia gallinarum was reported in the intestine of the spotted sandgrouse, Pterocles senegallus, collected in three different locations: Ga'ara Depression, Iraqi Western Desert, Zurbatiyah and Al-Attariyah, Middle of Iraq. Description and measurements of the nematode were given. The role of termites in the infection of P. senegallus with H. gallinarum was discussed. Occurrence of H. gallinarum in P. senegallus represents a new host record.
The research deals with the lyrical introduction in the commentary of Tarfa bin al-Abd as a formative system characterized by flexibility and richness of imagination, which achieved a formative treatment and a unique construction within the structures of the structural and semantic language. I dealt with the poetic verses represented by the lyrical introduction as a formative hypothesis, basing its goal on a methodological framework distributed on the problem that was summarized by the following question: Is it possible to look at the poetic pattern within the pre-Islamic poem / hanging blinking as a model, in its plastic dimensions and to identify the stylistic treatment that achieves the formation space within the poetic text. The rese
... Show MoreOften requires the investor to know the result of the company's activity contribute to the investor or by wanting to invest in them because profit or loss of the company affect positively or negatively in the price of shares of the company and with the end of the fiscal year delayed companies often to issue its financial statements after it is approved and audited by an observer External Auditor, From here came the idea of research that appears to stakeholders of financial statements proactive appear, including actual figures for earlier stages have been prepared lists about lists and planned by the administration reflect the results of its phase remainder of the year as if they are (half a year or season or month) to offer At the
... Show MoreAugust Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive
... Show MoreThis research deals with the attitude of oil press towards oil industry in the world and the extent of their concerns with the stages of oil industry relating to the abundance of oil and natural gas, as it is an international strategic and complementary industry. The researcher uses the survey method for content analysis of the initial article and the press news for two: years (2011-2012). The results if the study are as follows
1- Oil press is concerned with developing and the stages of the Arabic oil industry in the interest of OAPEC in the first place.
2- It is concerned with exploring, extracting, and marketing oil in the first place, then with refining operations in refineries and petrochemical plants in the second place, an
Controlling public expenditures is one of the main objectives of the public budget. The public budget often suffers from a deficit, whether in developed or developing countries, because expenditures are usually greater than the revenues generated. This requires the existence of financial rules that are adhered to by the government, which in turn leads to discipline. Fiscal policy leads to a reduction in the obligations incumbent on the government. Adhering to the financial rules would correct the course of fiscal policy in Iraq, with the need to direct oil revenues in the years of financial abundance when global oil prices rise to sovereign funds similar to other rentier countries, which contributes to maintaining the stabi
... Show MoreThe aim of this research is analysis the effect of the changes in (GDA, g, inflation) at average and standard economic curriculum in composition of the models, depending on SPSS program in analysis, and according to available date from central bank of Iraq and during the period from 2003 to 2018 and by using OLS and estimate of the equation and the results showed a statistical significance relation in incorporeal level 5% and the R2 value equal to 92.1 refer to the changes in independent variables explain 92% of changes of unemployment and the independent variables effect are very limit depend on estimated parameters in the model and respectively (0.986,0.229,-0.060), the research recommended necessity to active the inve
... Show MoreSuzanne Collins’ novel The Hunger Games suggests a new logic of victory and set a distinguished focus on the unique personality of her heroin which brings to the mind the permanent correlation between all moral values. The Hunger Games World seems to be much more like one big bowl as it links the past, present, and the future. An Intertextual reference is interwoven in the present research as it brings Golding’s Lord of the Flies to the surface, and it highlights certain similarities between the two texts. In which Ralph, Piggy and Simon in Golding’s Lord of the Flies are the incarnations of stable moral values and hope of surviving ethics and rules in a chaotic and turmoil world. The event
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreWithin this paper, we developed a new series of organic chromophores based on triphenyleamine (TPA) (AL1, AL-2, AL-11 and AL-22) by engineering the structure of the electron donor (D) unit via replacing a phenyle ring or inserting thiophene as a π-linkage. For the sake of scrutinizing the impact of the TPA donating ability and the spacer upon the photovoltaic, absorptional, energetic, and geometrical characteristic of these sensitizers, density functional theory (DFT) and time-dependent DFT (TD-DFT) have been utilized. According to structural characteristics, incorporating the acceptor, π-bridge and TPA does not result in a perfect coplanar conformation in AL-22. We computed EHOMO, ELUMO and bandgap (Eg) energies by performing frequency a
... Show More