The Umm Al-Naaj Marsh was chosen in Maysan province, and it is one of the sections of Mar Al-Hawza, which is one of the most prominent Iraqi marshes in the south. The marshes are located between latitudes 30 35 and 32 45 latitudes and longitudes 13 46 and 48 00. The area of the study area is 76479.432142 hectares to evaluate soil quality and health index and their spatial distribution based on measuring physical, chemical, biological and fertility traits and calculating the total quality index for those characteristics. Using an auger drilling machine, we collected 50 randomly selected surface samples, evenly distributed across the study region, from Al-Aq 0.0–0.30 m, noting their precise locations along the way. Soil health and quality were evaluated by determining the weight of evidence for physical, chemical, biological, and fertility parameters. The percentage of the second class in relation to the physical properties of the soil, which corresponds to the moderate variety of soil health, reached 100% of the study area. As for the chemical traits, the first class (poor) recorded 5.5%, the second class (moderate) 94%, and the third class (good) 0.5% of the area study area, While the percentage of the second class (moderate) for biological traits was 99.99%, and the first class (poor) appeared by 0.002% of the entire study area. As for the fertility traits, the first class (poor) appeared by 46%, the second class (moderate) by 68% and the third class good) by 6% of the study area. In comparison to the total quality index, the moderate variety accounted for 100% of the soil quality and overall health index in the study area, whereas the poor and good cultivars were nowhere to be found.
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreAbstract
The study was conducted in Baghdad and aimed to:
The impact of moving the educational activities in the conservation of literary
texts and the development of literary taste in the fifth grade students moral "by
verifying the validity of hypotheses Elsafreeten following forms:
The first hypothesis:
- There are no differences in women with statistical significance between means
of scores of students three experimental groups, the experimental group first
used upstream activities in the teaching material of literature and texts, the
second experimental group used the activities of building in the teaching
material itself and the experimental group the third use activities concluding
taught the same
Many critics suggest that Beckett’s early plays are comic because they focus their analyses on the use comic elements. Waiting for Godot is one of Beckett’s early plays, and it has been heavily analyzed and read as a comic text partly because its subtitle is “a tragicomedy in two acts” and also because of the comic techniques used in the play. The present paper, however, attempts to read the play as a piece in which comedy fails to produce any effects on the characters who remain apparently very desperate and frustrated throughout the play. The characters perform different comic acts, but they do not really feel amused or entertained. The paper suggests that the acts these characters put on stage are only means to pass t
... Show MoreSalmonella enteritidis one of more important as epidemiological bacteria between other salmonella types. It is very important pathologically that cause food poising and gastrointestinal tract infections. This study includes some of immunological changes that appear by ELISA test and antibiotic sensitivity test against these bacteria in mice. ELISA test results appears high immunological response happen after 3 days of inoculation, mean titration readings beginning 0.198 and the maximum mean titration after 15 days of inoculation 1.538 and begin to decrease after this time slowly to remain about 0.297 after 40 days of inoculation. An antibiotics sensitivity test result appears, this bacteria sensitive to Chloramphenicol, Ceftriaxone,
... Show MoreABSTRICT:
This study is concerned with the estimation of constant and time-varying parameters in non-linear ordinary differential equations, which do not have analytical solutions. The estimation is done in a multi-stage method where constant and time-varying parameters are estimated in a straight sequential way from several stages. In the first stage, the model of the differential equations is converted to a regression model that includes the state variables with their derivatives and then the estimation of the state variables and their derivatives in a penalized splines method and compensating the estimations in the regression model. In the second stage, the pseudo- least squares method was used to es
... Show More: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.
<p>The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task
... Show MoreDiyala river is the most important tributaries in Iraq, this river suffering from pollution, therefore, this research aimed to predict organic pollutants that represented by biological oxygen demand BOD, and inorganic pollutants that represented by total dissolved solids TDS for Diyala river in Iraq, the data used in this research were collected for the period from 2011-2016 for the last station in the river known as D17, before the river meeting Tigris river in Baghdad city. Analysis Neural Network ANN was used in order to find the mathematical models, the parameters used to predict BOD were seven parameters EC, Alk, Cl, K, TH, NO3, DO, after removing the less importance parameters. While the parameters that used to predict TDS were fourte
... Show More