Keys to four genera and twelve species of the subfamily Phlaeothripinae (Phlaeothripidae) were constructed, these are: Haplothrips; Karnyothrips; Phlaeothrips; and Dolicholepta ,and the species are: Haplothrips cerealis Priesner; Haplothrips tritici kurdjumov, Haplothrips hukkineni Priesner; Haplothrips subtilissimus (Haliday) ؛ Haplothrips reuteri Karny; Haplothrips jasonis Priesner; Haplothrips sallloumensis Priesner ; Haplothrips pharao Priesner ; Phlaeothrips sycomri Priesner ; Karnyothrips flavipus (Jones); Karnyothrips melaleucus (Bagnall) ; Dolicholepta micrurus (Bagnall). These were collected from Baghdad
... Show MoreThe Cassia glauca Lam. is the tree that belongs to the Fabaceae family and is native to India has many uses in indigenous systems of medicine, folk medicine, and traditional Brazilian medicine. Has many pharmacological activities such as anti-diabetic, antibacterial, antifungal, antioxidant, anti-hemolytic, anticancer, cardio-protective, and Hepato-protection. The aim of study is to Isolation, identification, and quantification of some compounds from aerial parts of Cassia glauca since no phytochemical investigation had previously been done in Iraq for this plant. The aerial parts were defatted in n. hexane for 48 hours. The defatted materials were extracted in 85% ethanol using the hot method (soxhlet), then the extract was fra
... Show Moreسعي المجتمع العراقي منذ أكثر من نصف قرن مضى لإعادة استثمار عشرات المليارات من الدولارات من الإيرادات النفطية في القطاع الزراعي وهياكله وبنياته التحية، كإنشاء السدود والخزانات المائية واستصلاح الأراضي والمشاريع الإنتاجية الحيوانية والنباتية وبطاقات كادت تقترب او تتجاوز حاجز طلب السكان من الأغذية والمنتوجات الزراعية التي تغذي الصناعة الا ان الزيادة السكانية وتحسن مستوى الدخل النفطي شكلا انتقالا جدي
... Show MoreThe current study included a detail morphological study of all parts of the species Ipomoea carnea Jacq. (Convolvulaceae) cultivated in different gardens, the roots, stems, leaves, flowers and fruit were studied in detail, also the pollen grains were studied and there are photographs for all the parts were putted.
The plant Borago officinalis, which belongs to the Boraginaceae family and Celebrated as borage, is one of the useful medicinal plants cultivated in Iraq. It was used in olde medicine in Iraq, Irane, Syria and Europe for management of various diseases. It is commonly used as an atonic, tranquilliser, management of cough, sore throat, pneumonia, swelling, inflammatory diseases, antioxidant, and anticancer. This project provides the first comprehensive research done in Iraq to study the phytochemicals and the methods of extraction and isolation of active constituents from Borago officinalis cultivated in Iraq. The plant was harvested in spring from AL-Rifai, Nassiriyah city, IRAQ in February 2019.were w
... Show MoreThis study is concerned with the recent changes that occurred in the last three years (2017-2019) in the marshes region in southern Iraq as a result of the changes in the global climate, the study included all the water bodies in the five governorates that are located in the southern regions of Iraq (Wasit, Maysan, Dhi-Qar, Qadisiyah and Basrah), which represent the marshes lands in Iraq. Scenes of the Landsat 8 satellite are used to create a mosaic to cover the five governorates within a time window with the slightest difference between the date of the scene capture, not to exceed 8 days. The results of calculating the changes in water areas were obtained using the classifier support vector machine, where high accuracy ratios were recorded
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreObjective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using
... Show More