This study was carried out from February to October 2012 in six semi salty ponds in Gwer sub-district which is the first work in the area. A total of 32 species and 2 genera of algae where reported as the new records. Mostly the non diatoms are belonging to Cyanophyta, Chlorophyta, Euglenophyta, Cryptophyta, Chrysophyceae, while diatoms or Bacilariophyceae are belong to pennals- order.
One of the most important problems in the statistical inference is estimating parameters and Reliability parameter and also interval estimation , and testing hypothesis . estimating two parameters of exponential distribution and also reliability parameter in a stress-strength model.
This parameter deals with estimating the scale parameter and the Location parameter µ , of two exponential distribution ,using moments estimator and maximum likelihood estimator , also we estimate the parameter R=pr(x>y), where x,y are two- parameter independent exponential random variables .
Statistical properties of this distribution and its properti
... Show MoreIn this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent r
... Show MoreThis study, establishes two stochastic monotonicity results concerning the run length of an upper one –sided Exponentially Weighted Moving Average (EWMA) control charts, based on the logarithm of the sample variance, for monitoring a process standard deviation, these properties cast interesting light on the control chart performance, and their extension to other one –sided EWMA control charts.
research aim :
- The research aimed to investigate the effect of two treatment
methods in the gaining of fourth grade students in geography
object.
- Research hypothesis
there are no statistically significant differences at the level of ( 0.05 )
in the average level of achievement in geography between the first
experimental group ( strengthening lessons ) and the second group
( re- teaching )
no individual differences statically significant at the level of ( 0.05 )
in the average level achievement in geography object of the second
experimental group ( re- teaching ) and the first experimental group
( strengthening lesson )
the research sample : the researcher selected randomly Baghdad
This study was conducted at the Poultry Research Station of the Agricultural Research Department/Ministry of Agriculture in Abu Ghraib for the period from 25/2/2019 to 7/4/2019 (42 days) with the aim of using several levels of Spirulina (SP)
The importance of research is to be considered by highlighting the tax policy in Iraq which extended for successive measurement of the amount of tax receipts for respective periods, the research problem represents security, economic and political issues that Iraq suffered which were very difficult since Nineties of the last century until now that led to a lake of clarity in tax policy trends, volatility in it and finally reflected on the tax revenues increase or decrease. One of the main recommendations of the research is: (The necessity to develop a deliberate strategy for tax policy in Iraq which should take into account financial, economic, and social goals in appropriate way).
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The local authority represented by the Provincial Council and the administrative units thereof has legislative and supervisory functions which are in the administration and supervision of the local public utilities as provided for by the laws in force. The subject of the interactive relationship between the federal authority and the provincial councils not organized in one of the main problems that accompanied the emergence and application of decentralized system Iraq after 2003, which began since the writing of the Constitution in force for the year 2005 and the law of the provinces No. 21 of 2008 This law has been subjected to political recordings that eventually led to the appearance of this consensus image. The weakness of the legisl
... Show MoreThis study aimed to identify and describe one of the bacterial feeder nematode Acrobeloides varius Kim, Kim and Park, 2017 (Rhabditida, Cephalobidae), which was isolated from soil samples that were collected from Baghdad, central of Iraq, and was classified using both morphological and molecular criteria. All specimens of A. varius were cultured, identified and described using morphometric criteria. Selected specimens (Zah. IRQ3 OR994579.1 isolate) of this species were characterized by having the body length of the male ranging from (184.94 – 221.72 μm), the body length of the female ranging (507.38 – 521.92 μm) and the body length of the juvenile ranging from (355.53 – 490.35 μm). Selected specimens of this species were m
... Show More