The presented research investigated the pollen morphology of endemic Iraqi Hypericum species. The study revealed phenotypic features of pollen grains in the polar and equatorial views and their quantitative and qualitative characteristics. The results showed that the pollen grains of the genus Hypericum were radially symmetrical and isopolar, and their apertures were simple and tricolporate, except the species H. davisii, distinguished as tetracolprate. Dividing the studied species based on pollen grain sizes comprised two groups. Small pollen grains with an average length of the equatorial view ranged between 10–16 μm in H. lysimachioides and H. vermiculare. Medium-sized pollen grains with an average extent between 17–26 μm emerged in the species, i.e., H. retusum, H. triquetrifolium, H. perforatum, H. lydium, H. tetrapterum, H. asperulium, H. scabrum, and H. davisii. Pollen grains, also divided according to the P/E ratio, had two main groups. The pollen grains were subprolate and spherical, with the exine sculpturing examined by a scanning electron microscope (SEM), and isolated into four groups: 1) microreticulate reticulum, including H. asperulium, H. lydium, and H. vermiculare, 2) perforate, i.e., H. retusum, H. scabrum, H. tetrapterum, and H. triquetrifolium, 3) psilate with H. perforatum and H. davisii, 4) and reticulate exine sculpturing in H. lysimachioides, all isolated from the rest of the species. SEM images showed the thickness of exine ranged from 0.5 to 2 μm. The topical study also added H. davisii as a new species with no previous records in Iraq. This pollen study added valuable data for taxonomy and suggested that it should proceed with its first-time registration in Iraq. The pertinent research could provide a taxonomical key for Hypericum species in Iraq.
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreWe aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure
In the drilling and production operations, the effectiveness of cementing jobs is crucial for efficient progress. The compressive strength of oil well cement is a key characteristic that reflects its ability to withstand forceful conditions over time. This study evaluates and improves the compressive strength and thickening time of Iraqi oil well cement class G from Babylon cement factory using two types of additives (Nano Alumina and Synthetic Fiber) to comply with the American Petroleum Institute (API) specifications. The additives were used in different proportions, and a set of samples was prepared under different conditions. Compressive strength and thickening time measurements were taken under different conditions. The amoun
... Show MoreStereolithography (SLA) has become an essential photocuring 3D printing process for producing parts of complex shapes from photosensitive resin exposed to UV light. The selection of the best printing parameters for good accuracy and surface quality can be further complicated by the geometric complexity of the models. This work introduces multiobjective optimization of SLA printing of 3D dental bridges based on simple CAD objects. The effect of the best combination of a low-cost resin 3D printer’s machine parameter settings, namely normal exposure time, bottom exposure time and bottom layers for less dimensional deviation and surface roughness, was studied. A multiobjective optimization method was utilized, combining the Taguchi me
... Show MoreTwo series of 1,3,4-oxadiazole derivatives at the sixth position of the 2,4-di-
This study aims at identifying the extent of SMS usage and understanding the role it plays in satisfying users' needs and motivations. In order to achieve this aim, an analytical descriptive method was adopted by conducting a field survey among students at Petra University.
The study resulted in many conclusions, the most important of which is that using SMS meets the students' cognitive, social and communicational needs and desires, the highest being communicating with friends at 75%, followed by exchanging songs and videos at 52%, as well as exchanging photos at 45%. In regards to their motivation for using text messaging, forgetting daily problems scored highest at 81.4% and spending free time followed at 77.4%. This proves th
... Show MoreTo assess the contribution of Doppler broadening and examine the
Compton profile, the Compton energy absorption cross sections are
measured and calculated using formulas based on a relativistic
impulse approximation. The Compton energy-absorption cross
sections are evaluated for different elements (Fe, Zn, Ag, Au and Hg)
and for a photon energy range (1 - 100 keV). With using these crosssections,
the Compton component of the mass–energy absorption
coefficient was derived, where the electron momentum prior to the
scattering event caused a Doppler broadening of the Compton line.
Also, the momentum resolution function was evaluated in terms of
incident and scattered photon energy and scattering angle. The res
The education sector suffers from many problems, including the scarcity of schools that can absorb the increasing number of students in light of the increasing population growth rate, as some regions suffer from a lack of opening of new schools or the expansion of existing schools to increase their capacity so that attention is required. The research sought to identify the level of maturity of project management at the research site (Building Department in Al-Karkh I/ Ministry of Education) Being responsible for educational projects and their implementation and to know that, the ten areas of the knowledge guide to project management PMBOK have been adopted according to the PM3 model (one of the models of maturity
... Show More
Abstract:
We can notice cluster data in social, health and behavioral sciences, so this type of data have a link between its observations and we can express these clusters through the relationship between measurements on units within the same group.
In this research, I estimate the reliability function of cluster function by using the seemingly unrelate
... Show More