This study aims at examining and confirming the patterns of phenetic relationships and the levels of variations within and among the species of Lotus L., 1753 in Egypt by using morphometric analysis techniques. We have evaluated 24 morphological characters from about 300 herbarium specimens representing 19 species of Lotus that are currently recognized. Based on numerical analyses of macromorphological characters (cluster analysis, principal coordinate analysis and principal component analysis), 19 species of Lotus were recognized from Egypt. These species were clustered in six species-specific groups: (I) Lotus halophilus Boiss. & Spruner, L. angustissimus L., L. glinoides Delile and L. schimperi Steud. ex Boiss., (II) Lotus glaber
... Show MoreMany condensed polymers [A1-A7] were prepared via reaction of (Ethylenediaminetetraacetic acid = EDTA), with different prepared imide-diamines by modification [ modification of amino acids and antibiotics (B1- B7)] Imide-diamines were prepared by chlorination of L-amino acids such as [ L-Histidine, L-Alanine, L-Valine, L-Glycine and L-Aspargine ] or selected antibiotics such as [Cephallixine monohydrate and Amoxilline ] with thionyl chloride at 0°C, then reacted with ammonia to obtain imidediamines [B1-B7] . The physical properties of all prepared condensed polymers [A1-A7], new prepared diamines [B1-B7] were studied and characterized by FT -IR spectroscope to certify the structural formulas. The thermal analysis (TGA, DTA) were studied, a
... Show MoreThe species of Opilio kakunini Snegovaya, Cokendolpher & Mozaffarian, 2018 was recorded for the first time in Iraq; as well as to four species belonging to this order which were recorded previously. In this paper, we added a new species to the checklist of Iraqi opilionid fauna with a description of the most important characteristics, along with genitalia, for both males and females are presented with digital photographs. Specimens of males and females were collected from Al- Rifai district northern of Dhi-Qar Province, southern of Iraq.
Research Summary
Praise be to God, Lord of the worlds, and prayers and peace be upon the most honorable of the prophets and messengers, our master Muhammad, and on the good God and his righteous companions.
For the most truthful hadith is the Book of God Almighty, and the best guidance is the guidance of the Prophet, may God bless him and grant him peace. If any)). Our good predecessor took care of collecting what they were able to collect and arrange from the words of the prophecy issued by our master Muhammad, peace and blessings be upon him, and wrote works on them including forms of support, parts, dictionaries, and mosques. About me, if any, in order to re
Parasitological examination of gills of three species of sparid fishes in the territorial waters of Iraq was performed, two diplectanid monogenoids were isolated and described; Lamellodiscus indicus Tripathi, 1959 from both Haffara seabream Rhabdosargus haffara (Forsskål, 1775) and Goldline seabream R. sarba (Forsskål, 1775) and Protolamellodiscus senilobatus Kritsky, Jiménez-Ruiz and Sey, 2000 from King soldierbream Argyrops spinifer (Forsskål, 1775). The record of the parasites is considered new to the parasite fauna of Iraq. The redescription of L. indicus for the first time which is collected from a new distribution area (Arabian Gulf). R. haffara is considered a new host record .
Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreText based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.
... Show MoreNumeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More