Preferred Language
Articles
/
QBhrdpQBVTCNdQwCbBk7
Detection of Genetic Relationship Between Eucalyptus Species in Iraq
...Show More Authors
Abstract<p>Environmental factors that damage plant cells by dehydrating them, such cold, drought, and high salinity, are the most common environmental stresses that have an impact on plant growth, development, and productivity in cultivated regions around the world. Several types of plants have several drought, salinity, and cold inducible genes that make them tolerant to environmental challenges. The purpose of this study was to investigate several species in <italic>Eucalyptus</italic> plants and determined the evolutionary descent between different species of <italic>Eucalyptus</italic>. Samples from plants were used to extract genomic DNA. After sequence methods with phylogenetic analysis using MEGA6, program. According to our findings, demonstrate that the sequences of several spp. were submitted to Gene Bank: <italic>E. alba</italic> (OP696606.1), <italic>E. bortryoides</italic> (OP696601.1), <italic>E. camaldulensis</italic> (OP696607.1), <italic>E. curtisii</italic> (OP696596.1), <italic>E. delegatensis</italic> (OP696604.1), <italic>E. erythrocorys</italic> (OP696599.1), <italic>E. globoidea</italic> (OP696597.1), <italic>E. leucoxylon</italic> (OP696598.1), <italic>E. macarthurii</italic> (OP696610.1), <italic>E. nicholii</italic> (OP696602.1), <italic>E. pauciflora</italic> (OP696603.1), <italic>E. siderophloia</italic> (OP696605.1), <italic>E. tereticornis</italic> (OP696611.1), and <italic>E. vicina</italic> (OP696608.1). These genes can be used to create crop plants that are resistant to drought.</p>
Scopus Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (33)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Thu Jun 27 2019
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
REVIEW OF OPISTHOGLYPHOUS SNAKES (REPTILIA, OPHIDIA ) OF IRAQ
...Show More Authors

Seven species of semi venomous Opisthoglypha snakes (Reptilia, Ophidia) of Iraq are listed with important characteristics in morphology due to geographical and individual variation of species, as well, the confusion in the scales count of Telescopus tessellatus martini (Schmidt, 1939) of Iraq are discussed.

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Postmodern Architecture between the pillars of philosophical discourse and architectural practice
...Show More Authors

Postmodern arguments, formed a critic case of what modernity brought in several levels. Postmodern practice was considered as a proactive case having amorphous concepts and features to what entiled as an intellectual trends postmodern philosophically and intellectually. But, what postmodernism architecture broughts in it essence, was not isolation from the intellectual context and entrepreneurship case, and it was not disconnecting from the intellectual and philosophical era of that period. Lliteratures and philosophical argument precede what (Robert Venturi) and (Charles A Jencks) had brought, albeit it was closer to critics and correction the path of modernity from crystallizing a direction that exceeds modrinity to wh

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
The Formative Truth of the Dramatic Work between Direction and Production
...Show More Authors

Most of the theorists and researchers and also those interested in cinema and television attributed the fact of the existence of the dramatic works to the directors may be due to a historical justification. At the same time, the existence of the production world came as a result of the emergence of the production city (Hollywood). This is also a historic fact. The research would tackle all the formative truths to prove the relation and the timeline, i.e., before and after and the synergy that resulted in the existence of the dramatic works that benefited the humanity and those interested in this giving art. The objective of the research is to uncover the formative truth of the dramatic work between direction and production.

The s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 15 2024
Journal Name
Iraqi Journal Of Science
Investigating the Correlations between Physical Parameters of Elliptical and Lenticular Galaxies
...Show More Authors

This study aims to investigate the features of stellar-gaseous kinematics and dynamics mass using scaling coefficient relationships (such as the Faber–Jackson relation (FJR)) of two samples of elliptical and lenticular galaxies. These two samples of 80 ellipticals and 97 lenticulars were selected from previous literature works. The Statistical Package for Social Sciences )SPSS( and Matrix Laboratory (MATLAB) program were used to find out the associations of multiple factors under investigation such as main kinematic properties of the gaseous-stellar (effective radius Re, surface density within the effective radius (Ʃeff) , stellar mass in the blue band (Mstar (B)), gas mass ( Mgas), dynamic (Mdyn) and baryonic (Mbar), supermassiv

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of The College Of Education For Women
The Historical effect of Conflict between North and South (1945-1995)
...Show More Authors

The Historical effect of Conflict between North and South

View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
قضايا سياسية
The Iraqi Constitution of 2005: Between Constitutional Stagnation and Political Stagnation
...Show More Authors

Browse Iraqi academic journals and research papers

View Publication