The research was aimed to identify fruits morphological characteristics of 33 taxa belonging to the Lepidieae tribe from Brassicaceae. The characteristics of the fruit's general shape, apex shape, dimensions, colors, surface ornamentation, and beak were determined, the results indicated the importance of each of those characters in isolated species, In general, all the tribe's fruits were open capsule and short silicula. According to the dimensions of fruit, three species can be distinguished as a group with dimensions greater than 20mm, as in Brossardia, Coluteocarpus, and Didymophysa, and depending on the shape, it was possible to differentiate the species within this group, while the other species were less than 20 mm. in dimensions. They were distinguished by the general shapes, as the fruits of the Aethionema species were distinguished by their winged shaped, whereas the fruits of the genus Biscutella are bi-lobed, and the fruits have an inverted semi-triangular shape in the Capsella and peltate with prominent veins in the genus Horwoodia, or maybe peltate and longitudinally splintered with dark veins in Iberis, while the genus Sameraria fruit is circular to semi-circular characterized by intermediate appendages, while the individuals of the genus Isatis have linear-oblong fruits, and the species of both genus Lipidium and Hymenolobus were distinguished by their small and elliptic fruits and could be differentiated according to other fruits features. So could be conclude the importance of the characteristic of the general shape of the fruit firstly in species isolation then size, ornamentation, and some other traits.
In this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More339 individuals , were sorted from 22 samples collected from three sites in Tigris River including , Al- Sarafiya district (S1), Al- Jaderiyah district (S2) and Al-Za'afaraniya district (S3), in addition to one site in the irrigation canal of the Al- Jaderiyah campus of the University of Baghdad (S4) , and in Al- Jeish canal(S5) east Baghdad. The sorting results revealed that the highest number of individuals of 102 was recorded at S4, whereas the lowest number of 24 individuals was recorded at S2. Regarding the sites, site S4 was the richest site with 30% of the total number represented 16 species, while each of S3 and S5 had 8 species only with 17.11% and 28.60% of the total individuals number respectively. The values of Jaccared Sim
... Show MoreWhat is meant by objectives: the purpose, secrets, judgment, and interests that the legislator set for each of its rulings is a doctrine and a law.
Faith is belief with certainty in God Almighty, and what is required of him in his divinity, lordship, names and attributes, belief in his angels, books, messengers, the Last Day and destiny, both good and bad.
And the purposes of faith are the wisdom and secrets contained in the Islamic faith and which achieve human well-being and happiness in the immediate and the future. And that the purposes of belief and faith are the essence of religion, rather it constitutes a basic pillar on which the basis of the intentional consideration as a whole, because the structure of worship i
... Show MoreThis research sheds light on the morphological structure of nouns and verbs in the novel "ASTONISHMENT" by the novelist Aharon Applefield by analysing selected models from the novel in a morphological analysis in order to identify the most important morphological features of this structure according to a statistical analytical approach.
The morphological structure is the main pillar of the linguistic structure of the literary text. Morphology is the science that studies the word, by which its structure and original letters are known, and the change that has occurred to it. The aesthetics of the fictional text is reflected in this structure, through which the writer conveys his ideas and narrations to the reader. The research
... Show MoreLeuciscidae species are the abundant and widely distributed fish species in Iraq's inland waters. They are complex species, and morphology makes them difficult to identify. Molecular analysis achieved and confirmed the morphological characters. Twenty specimens of Acanthobrama marmid were collected from two localities at Tigris River, in the middle of Iraq; 15 specimens from the Al-Zubaydia sub-district and five specimens from Al-Tharthar Lake. We used the mitochondrial DNA cytochrome b (cytb) gene to sequence the DNA of A. marmid. The following analysis are compared the sequences with those of other fish genera and species found in the Gene Bank. The barcoding result (DNA sequencing) in fishes found in the same family (Leuciscidae) showed
... Show MoreFounding a System to secure deposits and protecting the depositors is considered one of the important and exchanged subjects out there in the banking system/field in Iraq at the current time, and the reason behind the exchange and spread of this subject is due to the financial crisis of which the banking sector is suffering from and the stumbling of many banks, those factors have had led to the insecurity of the depositors and their mistrust towards banks, thus, it is necessary to create a system to secure deposits in which depositors would be compensated for the losses caused by the banks' failures. in addition, it could be a countermeasure system which maintains the banking stability, protects the rights of depositors and gains
... Show More