The current study aimed to identify the morphological description and branches of the bronchial tree and lung for the weasel
This research dealt with study of cladistics taxonomy of five species related to the genus Rumex L. and Polygonum L. from family polygonaceae in Iraq by using Mesquite software V.2.75. This research support strongly delimiting the species P. aviculare L. and P. lapathifolia L.as suggested in floras publication while R. dentatus L. is setted in single group whereas R. vesicarius L. and R. conglomeratus Murray were included in the same group. Also, this study involved characteristics of shape, dimensions, color, and ornamentation of seeds and fruits as the seed forms were ranging from lenticular to trigonous. In terms of size calculations, the seeds of R. vesicarius was recorded the higher range (4.0- 4.5) mm in length w
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreBackground: Semen contamination is a detrimental factor in decreasing fertility. Seasonal changes may affect the contamination, too. Objectives: This study was designed to detect semen contamination in ovine and caprine during different seasons. Methods: Six fully mature male sheep and goats were subjected to electro-ejaculator collection twice monthly from February 1, 2022, to January 31, 2023 (Spring, February 1, 2022-April 30, 2022; Summer, May 1, 2022, July 31, 2022; Autumn August 1, 2022, October 31, 2022; Winter November 1, 2022, January 31, 2023), for studying the seasonal effect. A total of 288 semen samples were collected from both species (36 samples from each per season). All samples were subjected to bacterial isolatio
... Show MoreThis paper addresses some of the morphological views of Al-Seraphy in the matter of "altasqeer" (reduction) in his book, "shareh ketab Sibawayh" (the explanation of Sibawayh's book) linking between them (views of Al-Seraphy) and the data of the morphological theme, in ancient times, and recently. Through balancing between what we have learned from the views of Al-Seraphy and the views of other former linguists and grammarians and latecomers of him. In this research we have linguistically and idiomatically explained the definition of "altasqeer" (reduction), and it's standard morphological balancing and what has deviated from it, by the examples in both cases; then we has produced the views of the grammarians of that "the definition of "a
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More