Reishi Mushroom, Ganoderma, is considered one of important wood-decaying medicinal mushrooms. This study aimed to identify three samples of this genus in Mosul city in February and April 2019. Three species of Ganoderma were collected from three various trees including Eucalyptus, Morus, and Olea (olive) in Mosul City, Northern Iraq. Their identifications and their DNA sequences were genetically identified by using PCR techniques according to detect nuclear ribosomal internal transcribed spacer (ITS) regions. Results exhibited the finding of Ganoderma resinaceum, Ganoderma applanatum, and Ganoderma sp. This study is first attempt to identify Reishi Mushroom by molecular methods in Iraq. Thus, the current study is considered new good data in the field of mushroom in Iraq especially based on the molecular strategies in the identification.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreFurosemide drug determination in pharmaceutical and biological urine samples using a novel continuous flow-injection analysis technique that is simple, rapid, sensitive and economical. The complex formed by the reaction of furosemide and O-phenylenediamine with oxidative agent K3[Fe(CN)6] to produce an orange-yellow colored product at 460 nm was the basis for the proposed method. The proposed method’s linearity ranges (3-100) μg.mL-1and (1-50) μg.mL-1 for CFIA/merging zone methods and batch .The detection limit and Limit of quantification values were 2.7502 μg.mL-1 and 9.1697 μg.mL-1 the relative standard deviation was 0.7143 %, and the average recovery is 98.80%
... Show MoreFrançois Mauriac’s novel The Desert of Love (1949) puts the reader before an experienced sociologist who is skillfully able to analyze the most mysterious human emotions and feelings. The writer's starting point is that people are similar in feelings but different in behavior. He severely criticized the aristocratic class and uncovered its defects and faults.
The novelist presents Courege's family as an example of the aristocratic class. It is a family torn by hatred, selfishness and disagreements due to absence of intimacy and love. This poisoned environment pushes the father and his son, Raymond, to search away for emotional ventures and banned relations
... Show MoreMultiple eliminations (de-multiple) are one of seismic processing steps to remove their effects and delineate the correct primary refractors. Using normal move out to flatten primaries is the way to eliminate multiples through transforming these data to frequency-wavenumber domain. The flatten primaries are aligned with zero axis of the frequency-wavenumber domain and any other reflection types (multiples and random noise) are distributed elsewhere. Dip-filter is applied to pass the aligned data and reject others will separate primaries from multiple after transforming the data back from frequency-wavenumber domain to time-distance domain. For that, a suggested name for this technique as normal move out- frequency-wavenumber domain
... Show MoreNasiriyah oilfield is located in the southern part of Iraq. It represents one of the promising oilfields. Mishrif Formation is considered as the main oil-bearing carbonate reservoir in Nasiriyah oilfield, containing heavy oil (API 25o(. The study aimed to calculate and model the petrophysical properties and build a three dimensional geological model for Mishrif Formation, thus estimating the oil reserve accurately and detecting the optimum locations for hydrocarbon production.
Fourteen vertical oil wells were adopted for constructing the structural and petrophysical models. The available well logs data, including density, neutron, sonic, gamma ray, self-potential, caliper and resistivity logs were used to calculate the
... Show More