Preferred Language
Articles
/
jnhm-685
ALLIANCE BETWEEN BARN SWALLOW HIRUNDO RUSTICA LINNAEUS, 1758 AND INDIAN MUSTARD BRASSICA JUNCEA (L.) CZERNAJEW, 1859: A NEW INTUITION IN BIRD-PLANT ECOLOGICAL NETWORKS
...Show More Authors

The habitat type and food availability always influence the population size of many
organisms. Bird’s feeding pattern should be abstracted to complete avian community structure
data. The agronomy main research farm of Orissa University of Agriculture and Technology
is a well-managed multi-crop agro-ecosystem which provides a suitable ground for ecological
research. In a multi-crop farmland, the association of Barn Swallow Hirundo rustica Linnaeus,
1758, with the Indian mustard Brassica juncea (L.) Czernajew, 1859 crops have been
recorded for the first time while hovering only on this field. A flock of Barn swallows was
recorded in 32 field visits while flying continuously over the Indian mustard field after
flowering to ripening of fruit in the morning and sometimes in afternoon also. The range of
the birds was recorded from 6 to 61 with a mean individual of 36.03 ± 15.37 hovering for
1.83 hr daily. This may be the behaviour for the feeding pattern of these flying insectivorous
birds which was not seen in other crop-fields with same insect diversity describing it as not
the only reason for this behaviour. To reveal this poorly understood behaviour of flying
insectivore birds, a detailed long term behavioural study with gut content analysis is needed to
explain the particular reason behind this behaviour of Barn swallows which will support the
conservation of these birds and control their population decline.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Engineering
Planning of Distribution Networks in Baghdad City
...Show More Authors

Planning of electrical distribution networks is considered of highest priority at the present time in Iraq, due to the huge increase in electrical demand and expansions imposed on distribution networks as a result of the great and rapid urban development.

Distribution system planning simulates and studies the behavior of electrical distribution networks under different operating conditions. The study provide understanding of the existing system and to prepare a short term development plan or a long term plan used to guide system expansion and future investments needed for improved network performance.

The objective of this research is the planning of Al_Bayaa 11 kV distribution network in Baghdad city bas

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Measurement of Pollution Level with Particulate Matter in Babylon Concrete Plant and Evaluation of Oxidative Stress and Hematological Profile of Plant Workers
...Show More Authors

The impact of exposure to different sizes of particulate matter (PM1, PM2.5, PM7, and PM10) was evaluated in  Babylon concrete plant workers who had been exposed to concrete dust for at least 10 years.  The effects of  these particles on the hematological parameters, malondialdehyde (MDA) levels, and  antioxidant enzymes (catalase and glutathione peroxidase ) were examined. The results exhibited that the levels of PM2.5 and PM10 were higher than the acceptable limits approved by the National Ambient Air Quality Standards (NAAQS). The blood parameters, namely white blood cells (WBC), red blood cell (RBC) and platelets counts, demonstrated non-significant differences between workers exposed to the PM as compared to the control gro

... Show More
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
Social Media Networks and Freedom of Expression of Individual Rights and Social Diversity: Facebook is a Sample
...Show More Authors

We are, today, facing a torrent of information, ideas, images and videos due to advances of communication technology and electronic publishing. In addition to the proliferation of social networking sites that allow individuals to use them and participate in their channels without any restrictions limiting their freedom in publishing. Due to these sites many terms have emerged like alternative media which use internet and its various techniques to serve its objectives notably the freedom of expression without restrictions. This research studies the phenomenon of interactive media i.e. alternative media through Facebook along with the freedom that makes it spreading in the society and the relation of individual freedom with social diversit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Https://www.researchgate.net/journal/university-of-baghdad-engineering-journal-1726-4073
Hazard analysis in drinking water plant
...Show More Authors

Source, sedimentation, coagulation, flocculation, filter, and tank are parts of a water treatment plant. As a result, some issues threaten the process and affect the drinking water quality, which is required to provide clean drinking water according to special standards and international and local specifications, determined by laboratory results from physical, chemical, and biological tests. In order to keep the water safe for drinking, it is necessary to analyze the risks and assess the pollution that occurs in every part of the plant. The method is carried out in a common way, which is monitoring through laboratory tests, and it is among the standards of the global and local health regulators

Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Journal Of Engineering
Hazard analysis in drinking water plant
...Show More Authors

Source, sedimentation, coagulation, flocculation, filter, and tank are parts of a water treatment plant. As a result, some issues threaten the process and affect the drinking water quality, which is required to provide clean drinking water according to special standards and international and local specifications, determined by laboratory results from physical, chemical, and biological tests. In order to keep the water safe for drinking, it is necessary to analyze the risks and assess the pollution that occurs in every part of the plant. The method is carried out in a common way, which is monitoring through laboratory tests, and it is among the standards of the global and local health regulators

View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Egyptian Journal Of Aquatic Research
Ecological factors affecting the distribution of the zooplankton community in the Tigris River at Baghdad region, Iraq
...Show More Authors

View Publication
Scopus (34)
Crossref (23)
Scopus Crossref
Publication Date
Thu Feb 19 2026
Journal Name
Journal Of The College Of Basic Education
A comparative study between students of smokers and non-smokers in endurance antenna
...Show More Authors

Subjects took physical fitness for health imposed on the area of research that have become an important and clear answer to the many problems resulting from the nature of dealing with modern life current actions that were needed to be hours of manual work has become accomplished by modern technology circumstance minutes, and mediated equipment And machinery. The lack of traffic rights and further burdens the intellectual and psychological pressures and the typical method of work has led to the identification of kinetic activity, thereby threatening public health in many ways stands at the forefront of these threats the problem of smoking, which causes many types of cancers, notably lung cancer. The most important reasons that led to This dr

... Show More
View Publication
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
Women's Rape in Iraq between Legislation and Social Norms: A Critical Discourse Analysis
...Show More Authors

Recently, women's rape has been a pervasive problem in the Iraqi society. Thus, it has become necessary to consider the role of language and its influence on the common beliefs and opinions about rape in the Iraqi society. Thus, taking into consideration the critical role of language and its impact on the perception of human reality and the social development based on people's beliefs and principles of life has become highly indispensable. Therefore. The aim of this article is to address this problem critically from legislation and social norms in NGOs' reports (2015; 2019) with reference to some provisions from the Iraqi Panel Code (1969; 2010). Therefore, the researchers examine the discursive strategies and ideological viewpoints in t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref