To identify the fungi associated with water hyacinth (Eichhornia crassipes [Mart.] Solms), an aquatic weed, which presents in Tigris river from Baghdad south ward. Five regions from middle and south of Iraq (Al-Noumanya, Saeid Bin-Jubier, Al-Azizia, Al-Reyfay and Al-Hay) were selected for this study. Twelve fungal species were isolated. Alternaria alternata, Acremonium sp and Cladsporium herbarum, were the most frequently species (91.66 % ,50 % and 25 %) respectively. The fungi Alternaria alternata, Acremonium sp. and Phoma eupyrena were more aggressive to water hyacinth as (91.66%,83,33%, and 75%) in pathogenicity test.
Snakes, or active contours, are used extensively in computer vision and image processing applications, particularly to locate object boundaries. In this research, for the segmentation of anatomical structures in medical images three approaches were implemented and compared like (original snake model, distance potential force model and Gradient Vector Flow (GVF) snake model). We used Computed Tomography image (CT) for our experiments. Our experiments show that original snake model has two problems; first is the limited capture range and the second is the poor convergence. Distance potential force model solved only the first problem of original snake and failed with second problem. Gradient Vector Flow (GVF snake) provides a go
... Show MoreThe study focuses on Kamez model and the Claus Meyer model of instructional design, which are models that provide the learner with educational experiences to suit the logical information of the learner and the variety of instructional models. Research Objective: The present research aims to identify Limitations of the study. The current research is determined by ((fourth grade preparatory students, the book of the date of the fourth preparatory course)) Chapter II includes Arabic and foreign studies on the model of Kemp and Claus Mayer in the acquisition of concepts and direction towards the material. Chapter III Experimental Design: The researcher adopted an experimental design with two experimental groups and a control group. The resea
... Show MoreIn this research want to make analysis for some indicators and it's classifications that related with the teaching process and the scientific level for graduate studies in the university by using analysis of variance for ranked data for repeated measurements instead of the ordinary analysis of variance . We reach many conclusions for the
important classifications for each indicator that has affected on the teaching process. &nb
... Show MoreBorrowing in linguistics refers to the process whereby a group of speakers incorporates certain foreign linguistic components into their home language via a process known as linguistic borrowing. The process by which these foreign linguistic elements, known as loanwords, go through phonological, morphological, or semantic changes in order for them to fit the grammar of the recipient language is referred to as loanword adaptation. Loanwords go through these changes in order for them to become compatible with the grammar of the recipient language. One of the most divisive topics in loanword phonology is whether adaptations occur at the phonemic or phonetic levels, and current literature distinguishes three primary viewpoints: nativiza
... Show MoreCoupling reaction of 4-aminoantipyrene with 8-hydroxyqunoline gave the new bidentate azo ligand 5-(4-antipyrene azo)-8-hydroxyqunoline. Treatment of this ligand with the following metals ions (MnII, CoII, NiII, CuII and ZnII) in aqueous ethanol with a 1:2 M:L ratio yielded a series of neutral complexes of the general formula [M(L)2Cl2]. The prepared complexes were characterized using flame atomic absorption, FT.IR, UV-Vis spectroscopic as well as magnetic susceptibility and conductivity measurements. Chloride ion content were also evaluated by (Mohr Method). From above data, the proposed molecular structure for these complexes as octahedral geometry.
Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreSalicylaldehyde was reacting with 2-amino benzoic acid to produce the Schiff base ligand benzoic acid 2-salicylidene (L). The prepared ligand was identified by Microelemental Analysis, FT.IR and UV-Vis spectroscopic techniques. A new complexes of Co(II),Ni(II),Cu(II) and Zn(II) with Schiff base was prepared in aqueous ethanol with a (1:1) M:L. The prepared complexes were characterized using flame atomic absorption, (C.H.N) Analysis, FT.IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Biological activity of the ligand and complexes against three selected types of bacteria were also examined. Some of the complexes exhibit good bacterial activities. From the obtained data the tetrahedral str
... Show MoreThe last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.