Eichhornia crassipes (Mart.) Solms or Water hyacinth is a fertile floating aquatic widespread in worldwide. The form of plants and the anatomy parts of this plant were studied. The most important feature was obvious the air chamber with intercellular spaces by amazing arrangement. As well can notice aerenchyma tissue allow the parts of plants floated on the surface of water located in the ground meristem of root, petiole and in the mesophyll of leaves also presence of two type of crystals raphides and styloid crystals was noted of various member in the plant in addition appear astrosclereids around the air chambers, to support the plant parts from the unsuitable environmental conditions such as the speed of water flow or floods or high levels of water.
Since the beginning of the twentieth century, the art of composition has witnessed major transformations that accompanied the transformations that occurred in the cognitive field. The plastic artists rejected the prevailing artistic line, and sought to create a new artistic format that accommodates the new social and cultural problems. So was the announcement of the era of modernity in the late nineteenth century, with the birth of the impressionism movement that gave a place to challenge all that is familiar. . And he drew the attention of the researcher, and for that he chose the research title (Characteristics of Modernity in the Works of Saleh Al-Jumayyi (Analytical Study)) The researcher divided the research as follows:
Methodolo
The present study attempts to determine the effect of freezing for different periods on preserved bodies of fish in the laboratory to keep for the research and diagnosis of taxonomic studies and not for consumption. It also endeavors to identify the effect of freezing on some morphometric features of the preserved bodies of fishes. Planiliza abu fish were used to conduct the present study. Fish were frozen by regular freezing in the home refrigerator freezer with temperatures reaching four degrees centigrade below zero. Freezing time is distributed over four months; biometric measurements of frozen fish have been taken in these periods represented by body total length, Standard length, and Head length in centimeters using a ruler ve
... Show MoreA biological experirne.rit was CQhducted ·ll1 the (Ibn- AlÂ
Haitham). University of Baghdad for growing seasens on of
2004/2005 (by using gypsum soil taken from Al- Doar area I Salah Al Dean provinc) to stucl·- the effect three levels of phosphorus (0, 400,
SOO)rng ! pot and four levels of zinc (0, 10,.. J 5, 2.0) tngf I pot on some
features of two varieties -Qf wheat, (triticum aestivurn var. rateh)and
(Triticum aestiv1lm Var. Ipa 99)..
R't
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
In this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More