The genetic toxicity of aqueous and alcoholic extracts of seeds of Peganum harmala L. was evaluated on the onion roots ,using concentrations 10,25,50,100 and 200 % w/v of extracts and periods of exposure 24,48 and 74 hours. The results indicated that the Peganum harmala significantly decreased root growth rate of onion root at all concentrations and treatment periods in comparison to the control , the growth of the root decreased when increasing the extract concentration.The EC50value of aqueous extracts was 50% and for alcohol extract was 25% ,thus the alcohol extract was most effective in the growth rate of the roots from the aqueous extract. The results also indicated that the mitotic index of Allium cepa was signifi
... Show MoreWhen the number of confirmed coronavirus disease cases rose in Iraq in the middle of February 2021, the Iraqi government performed a closure approach to constrain mobility and factory operations and enforce social distancing. In this research, the concentrations of air components (PM2.5, PM10, nitrogen dioxide (NO2) and ozone (O3)), which represent herein the degree of air quality index, were recorded, drawn and evaluated over central (Baghdad, the capital), northern (Kirkuk Province) and southern (Basra Province) Iraq before and during the closure. The experimental duration of this research was 6 months (from 1 January 2021 to 30 June 2021), which
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreThe integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant
... Show More