Pollen grains morphology have been studied for the wild species of the genus Erysimum L. which belong to Crucifereae family in Iraq. These species are E. filifolium Boiss. et Hausskn., E. oleifolium J. Gay, E. repandum L., E. eginense Hausskn. ex Bornm., E. aucheranum J. Gay, E. cheiranthoides L., E. alpestre Ky. ex Boiss., E. kurdicum Boiss. et Hausskn., E. tenellum DC., E. strophades Boiss., E. gladiiferum Boiss. et Hausskn., E. nasturtioides Boiss. et Hausskn. The study was performe by using light microscope . The study reveal that there was only one type of pollen grain named Tricoplate in all studied species . The study also demonstrated that there were differences among pollen grains morphology . The species E. kurdicum , E. alpestre , and E. strophades have shown Oblate form , while the species E. oleifolium , E. repandum , E. filifolium , E. aucheranum , and E. tenellum have Oblate-spheroidal form . On the other hand the species E. eginense , E. gladiiferum , E. cheiranthoides , and E. nasturtioides have Sub-oblate pollen . It was also noticed that the outer layer of pollen grains has more thickened wall than the inner layer . The data also shown that there were differences in pollen grains sizes . The species E. oleifolium , E. strophades , E. filifolium , E. gladiiferum , E. E. kurdicum , E. aucheranum , E. tenellum , E. repandum , and E. nasturtioides have very small pollen grains , while they were small to middle in the other species .The data getting from this study showed important taxonomical characters to classifying the studied species
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MorePurpose: To validate a UV-visible spectrophotometric technique for evaluating niclosamide (NIC) concentration in different media across various values of pH. Methods: NIC was investigated using a UV-visible spectrophotometer in acidic buffer solution (ABS) of pH 1.2, deionized water (DW), and phosphate buffer solution (PBS), pH 7.4. The characterization of NIC was done with differential scanning calorimeter (DSC), powder X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The UV analysis was validated for accuracy, precision, linearity, and robustness. Results: The DSC spectra showed a single endothermic peak at 228.43 °C (corresponding to the melting point of NIC), while XRD and FTIR analysis confirmed the identit
... Show MoreSoftware-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an
... Show MoreNaproxen is non-steroidal anti-inflammatory drug, which has antipyretic and anti-inflammatory effect. It is extensively bound to plasma albumin, and exhibits gastric toxicity, so it may be more efficient to deliver the drug in its sustained release dosage form and adequate blood level is achieved. Three liquid formulations with in situ gelling properties have been assessed for their potential for the oral sustained delivery of naproxen . The formulations were dilute solutions of: (a) pectin; (b) gellan gum and; (c) sodium alginate, all containing complexed calcium ion that form gels when these ions are released in the acidic environment of the stomach . The viscosity of the sols and drug release were measured, and was found to be depende
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreAbstract
Binary polymer blend was prepared by mechanical mixing method of unsaturated polyester resin with Nitrile Butadiene Rubber (NBR) with different weight ratios (0, 5, 10 and 15) % of (NBR). Tensile characteristics and wear rates of these blends were studied for all mixing ratios. The microstructure of fracture surfaces of the prepared samples were investigated by optical microscope. The results were showed that strain rates of the resin material increase after blending it with rubber while the ultimate tensile strength and Young’s modulus values of it will decrease. It is also noticed that the wear rate of resin decreases with increasing of (NBR) content.
Keywords:<
... Show MoreBackground: The main objective was to compare the outcome of single layer interrupted extra-mucosal sutures with that of double layer suturing in the closure of colostomies.
Subjects and Methods: Sixty-seven patients with closure colostomy were assigned in a prospective randomized fashion into either single layer extra-mucosal anastomosis (Group A) or double layer anastomosis (Group B). Primary outcome measures included mean time taken for anastomosis, immediate postoperative complications, and mean duration of hospital stay. Secondary outcome measures assessed the postoperative return of bowel function, and the overall mean cost. Chi-square test and student t-test did the statistical analysis..
Resu
... Show More