In this paper, the species of the genus of Chlaenius Bonelli, 1810 (Coleoptera, Carabidae) were reviewed, and it was revealed that there are 21 confirmed species in Iraq; among them, the species of Chlaenius hamifer Chaudoir, 1856 was recorded for the first time in Iraq.
Diagnostic characters, a redescription of some of the morphological features, photographs and illustrations are provided for the new record species in this investigation.
Internal control is system,defined and implemented under its responsibility , which aims to ensure that; laws and regulations are complied with; the instructions and directional guidelines fixed by Executive Management or the Management Borad are applied; the company internal processes are functioning correctlly , particularly those implicating the security of its assets; Financial Information is reliable; and generally contributes to the control over its activities , to the efficiency of its operation and to the efficient utilisation of its Resources. By helping to anticipate and control the risks involved in not meeting the objectives the company has set for itself, the internal control system plays akey role in conducting & monito
... Show MoreA new set of metal complexes by the general formula [M(P)2(H2O)2]Cl2 has been prepared through the interaction of the new Ligand [N1, N4-bis(4-methoxyphenyl)succinamide] (P) derived from succinyl chloride with p-anisidine with the transition metal ions [Cu(II), Mn(II), Cd(II), Co(II) and Ni(II)]. Compounds diagnosed by TGA, 1 H, 13CNMR and Mass spectra (for (P)), Fourier-transform infrared and Electronic spectrum, Magnetic measurement, molar conduct, (%M, %C, %H, %N). These measurements indicate that (P) is associated with the metal ion in a bi-dentate fashion by nitrogen atoms (the amide group), and the octahedral composition of these complexes is suggested. Staphylococcus Aureus (+) and Escherichia Coli (–) were studied for the antibact
... Show More12 membered Schiff base macrocyclic ligands, 6,7,14,15-tetra phenyl-1,2,3,4, 4a,8a, 9,10, 11,12, 12a,16a-dodecahydro dibenzo [b,h] [1,4,7,10] tetraazacyclododecine L1, and 14 membered Schiff base macrocyclic ligands, 6,8,15,17-tetramethyl-1,2,3,4, 4a,7,9a, 10,11,12,13,13a,16,18a-tetra decahydro dibenzo[b,i] [1, 4,8,11] cyclotetradecine tetraaza L2, 7,16-bis(2,4- dichloro benz ylidene)-6,8,15,17-tetra methyl-1,2,3,4, 4a,7,9a, 10, 11,12, 13, 13a,16,18a-tetra deca hydro dibenzo [b,i] [1,4,8,11] tetra azacyclo tetra decine L3 and 6,8,15, 17-tetramethyl-1,2,3, 4,4a,9a,10, 11,12,13,13a,18a-dodecahydro dibenzo [b,i] [1,4,8, 11] tetraazacyclo tetradecine (7,16-diylidene) bis(methanylyli dene) bis (N,N-dimethylaniline) L4 were synthesized by condens
... Show MoreThe present work involved preparation of new substituted and unsubstituted and poly imides (1-17) using reaction of acryloyl chloride with different amides (aliphatic ,aromatic) in the presence of a suitable solvent and amount tri ethyl amine (Et3N) with heating – the structure confirmation of all polymers were proved using FT-IR,1H-NMR,C13NMR and UV spectroscopy ,thermal analysis (TG) for some polymers confirmed their thermal stabilities . Other physical properties including softening and melting points, PH and solubility of the polymers were also measured
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
* Khalifa E. Sharquie1, Hayder Al-Hamamy2, Adil A. Noaimi1, Mohammed A. Al-Marsomy3, Husam Ali Salman4, American Journal of Dermatology and Venereology, 2014 - Cited by 2