Genus Eucalyptus belongs to the family Myrtaceae that consists of more than 700 species, various hybrids and varieties. The majorly distributed species that are grown in Iraq are Eucalyptus alba, E. macarthurii, E. siderophloia and E. camaldulensis, E. tereticornis, E. vicina. Most Eucalyptus species are highly dependent on rainfall, and this is challenged by climatic changes owing to global warming making it difficult to effectively match the availability of mature trees and the market demand, especially for use as power transmission poles. With the widespread availability of other naturally occurring Eucalyptus species, it has become important to determine the genetic diversity and to analyze the phenotypic traits of these species for suitability as power transmission poles. However, the absence of complete genomic data for this plant greatly limits its ability to progress genetically. The goal of this study was to examine the ribosomal RNA gene in Eucalyptus plants and control the sequencing system on a large scale in this species. Samples from plants were used to extract genomic DNA. Detection analysis was performed using PCR methods. Sequence analysis of ribosomal RNA gene was conducted with data analysis. Gel electrophoresis revealed bands of extracted nucleic acid from the ribosomal RNA gene of plants. The ribosomal RNA gene had several transitions and transversion mutations when compared to other globally known ones. Our findings demonstrated that the ribosomal gene developed in this study can be used for detecting the genus of Eucalyptus plants and obtaining 14 species belonging to the genus of the Eucalyptus was registered at the Gene Bank as new species in Iraq.
The present study was designed to estimate the active ingredients in the aqueous extract of fennel Foeniculum vulgare L. fruits and test the effects of different concentrations of the extract on serum estrogen and prolactin levels in female rats. The work was conducted to prepare the aqueous extract in the laboratory, while the secondary active substances in the extract were estimated using High-Performance Liquid Chromatography (HPLC) technology. The experiments were conducted in the animal house of the College of Science, Tikrit university,on a total of 12 adult albino virgin female rats divided into four groups, each having three rats.The aqueous extract of the fruit plant was administrate
... Show MoreThis paper introduces a generalization sequence of positive and linear operators of integral type based on two parameters to improve the order of approximation. First, the simultaneous approximation is studied and a Voronovskaja-type asymptotic formula is introduced. Next, an error of the estimation in the simultaneous approximation is found. Finally, a numerical example to approximate a test function and its first derivative of this function is given for some values of the parameters.
The middle Cenomanian – early Turonian Mishrif Formation, a major carbonate reservoir unit in southern Iraq, was studied using cuttings and core samples and wireline logs (gamma‐ray, density and sonic) from 66 wells at 15 oilfields. Depositional facies ranging from deep marine to tidal flat were recorded. Microfacies interpretations together with wireline log interpretations show that the formation is composed of transgressive and regressive hemicycles. The regressive hemicycles are interpreted to indicate the progradation of rudist lithosomes (highstand systems tract deposits) towards distal basinal locations such as the Kumait, Luhais and Abu Amood oilfield areas. Transgressive hemicycles (transgressive systems tract deposits)
... Show MoreBackground Subtraction (BGS) is one of the main techniques used for moving object detection which further utilized in video analysis, especially in video surveillance systems. Practically, acquiring a robust background (reference) image is a real challenge due to the dynamic change in the scene. Hence, a key point to BGS is background modeling, in which a model is built and repeatedly used to reconstruct the background image.
From N frames the proposed method store N pixels at location(x,y) in a buffer, then it classify pixel intensity values at that buffer using a proposed online clustering model based on the idea of relative run length, the cluster center with the highest frequency will be adopted as the background pixel
... Show MoreThe media of all kinds have the task of introducing, expressing and objectively representing the cultures of different societies in various types and forms of press and media. The precept of media pluralism is the basis for freedom of expression & the cornerstone of its realization. Therefore, it is linked to the establishment of several conditions and elements in order to establish it as a principle and practice. Issues of cultural diversity in media and cultural pluralism are one of the most important elements and indicators. So, this paper aims to shed light on the concept of media pluralism and related concepts within the framework of cultural diversity and multicultural indicators. Thus, highlighting the feature
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe specimens of Camponotusxerxes Forel, 1904 were collected from different localities in Iraq; the purpose of morphological study of this species in details throughout the present study.
The description was based on major workers belonging to this species, also some notes of polymorphism in workers have been mentioned; the most important of morphological features are illustrated and figured.
Microorganisms establish both structural and functional construction in the marine environment, despite scientific advances, the identification of marine bacterial species is still considered as a common challenge in microbiology. Nevertheless, the present study aims to make an effort, although it seems modest, but it could establish a basis for studying the bacterial diversity in the Iraqi marine area, because of what this aspect entails of the poverty of studies related to this aspect in the studied area. The current results show the marine studied area are classified within worming area, where the average temperature ranged from 23.17 to 26.17 ºC. The recorded number of bacteria was increased with temperature increasing (0.210, 0.250
... Show MoreTargeted research to study variations formalism in the paintings of the scratch -linear , and through surveys carried out by the researcher , found and to his knowledge that the study did not address the researchers before, this researcher found rationale in the study of plates scratch and identify variations of design in it. , Which included the first chapter of the research problem in question the following: What morphological variations in the paintings of the scratch -linear ?In order to reach solutions to this problem and to achieve results so research aims to identify the characteristics of the scratch for paintings , and design fundamentals and relationships , which are identified by the researcher Balentajat completed in all of I
... Show MoreSteganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to b
... Show More