Pollen grains morphology have been studied for the wild species of the genus Erysimum L. which belong to Crucifereae family in Iraq. These species are E. filifolium Boiss. et Hausskn., E. oleifolium J. Gay, E. repandum L., E. eginense Hausskn. ex Bornm., E. aucheranum J. Gay, E. cheiranthoides L., E. alpestre Ky. ex Boiss., E. kurdicum Boiss. et Hausskn., E. tenellum DC., E. strophades Boiss., E. gladiiferum Boiss. et Hausskn., E. nasturtioides Boiss. et Hausskn. The study was performe by using light microscope . The study reveal that there was only one type of pollen grain named Tricoplate in all studied species . The study also demonstrated that there were differences among pollen grains morphology . The species E. kurdicum , E. alpestre , and E. strophades have shown Oblate form , while the species E. oleifolium , E. repandum , E. filifolium , E. aucheranum , and E. tenellum have Oblate-spheroidal form . On the other hand the species E. eginense , E. gladiiferum , E. cheiranthoides , and E. nasturtioides have Sub-oblate pollen . It was also noticed that the outer layer of pollen grains has more thickened wall than the inner layer . The data also shown that there were differences in pollen grains sizes . The species E. oleifolium , E. strophades , E. filifolium , E. gladiiferum , E. E. kurdicum , E. aucheranum , E. tenellum , E. repandum , and E. nasturtioides have very small pollen grains , while they were small to middle in the other species .The data getting from this study showed important taxonomical characters to classifying the studied species
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More There is an increase in the need for cost accounting in all organizations and from different sectors to provide detailed information to the totals of financial accounting, first and help solve problems associated with inventory and analysis, tabulation and allocation of cost elements II and do the planning process and provide the necessary oversight and help to take the right decisions such as pricing decisions that need to Information cost accounting.
And suffer most of the non-governmental organizations from the lack of a cost accounting system provides information on the cost of service in these organizations and the department research sample circle v
content Analysis for Some Type of Pillows used in Iraqi houses
Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an
... Show MoreTime is very important in educational institutions. It is also one of our contemporary problem ‚as time is a clear – cut and limited factor‚ it demands that administrators should monitor it by administering and monitoring the principles of time.
Hence‚ the researcher attempts to identify the skills of administrating time and the reasons that cause the waste of time of the Heads of Departments at university of Baghdad.
Significance of the research:
Time is very important to all educational administrators and one of them is the institutions of Higher education. One of the
... Show MoreSince the advent of the sunrise of the immortal message, Islamic legislation has always established justice and the right guidance, and has prevented any perversion, injustice or corruption, with a divine system that called in its course the characteristics of the legislation on its general basis and its ability to develop, progressivity, and paving the way with a collective approach, accompanied by the worldly and moral punishment. When the corrupters went too far, reformers were delayed and values were missed; Mankind has been afflicted with the scourge of injustice and loss, and has lost sight of the approach that the Creator of the world has given to the people of the world, for what would guide them in their affairs sooner and later
... Show MoreAS Salman, SK Hameed…, Karbala Journal of Physical Education Sciences, 2020