This research dealt with study of cladistics taxonomy of five species related to the genus Rumex L. and Polygonum L. from family polygonaceae in Iraq by using Mesquite software V.2.75. This research support strongly delimiting the species P. aviculare L. and P. lapathifolia L.as suggested in floras publication while R. dentatus L. is setted in single group whereas R. vesicarius L. and R. conglomeratus Murray were included in the same group. Also, this study involved characteristics of shape, dimensions, color, and ornamentation of seeds and fruits as the seed forms were ranging from lenticular to trigonous. In terms of size calculations, the seeds of R. vesicarius was recorded the higher range (4.0- 4.5) mm in length while, P. aviculare recorded the lowest (1.5-1) mm in length. However, the shape was lenticular in P. lapathifolia and trigonous in the remaining species. Color of seeds and surface ornamentation is recognized. fruits shape is an important characters in identification of selected species as two groups are distinguished: persistent tubercules tepals which are spine teeth in R. dentatus and tongue like shape in R. conglomeratus, the second group is persistent tepals which are papery in P. lapathifolia, biconvex in P. aviculare and cordate to winged as in R. vesicarius beside that, colors, dimensions and surface nature is also recorded.
That less duration takes larva mature into a virgin under field conditions is one day during Alguetrh from April to October and last longer to more than a day during Alguetrh from November to February and up to nine days in January when low minimum temperature to zero degreespercentage that these larvae can not be a high percentage in the field ranging from 90-100% reduced Hessian Alnsphaly 85% during the months of July and Cape
Three plant species were picked randomly and their alcoholic extracts have been screened to know their effects on the phagocytic capability and intracellular killing of yeast by human peripheral macrophages. Macrophage cultures were incubated with different concentration of each plant extract: for 15 min., 30 min .and 45 min. The phagocytes activity in Iresine herbstii extract was significantly (p?0.05) increased with increasing dose and time of incubation. In Mentha piperita extract, increasing in dose and time of incubation leads to elevate phagocytic capbility, especially in the dose of 20% and 25% of plant extract, perhaps because the antimicrobial and antiviral activities of this plant, as well as strong antioxidant and antitumor act
... Show MoreThe effect of the tensor term in the Skyrme interaction has been estimated in calculating the static and dynamic nuclear properties in sd and fp-shell model spaces nuclei. The nuclear shell gaps have been studied with different Skyrme parameterizations; Skxta and Skxtb with tensor interaction, SkX, SkM, and SLy4 without tensor interaction, and Skxcsb with consideration of the effect of charge symmetry breaking. We have examined the stability of N = 28 for 42Si and 48Ca. The results showed that the disappearance of the magicity occurs in the shell closure of 42Si. Furthermore, excitation energy, quadrupole deformation, neutron separation energy, pairing energy, and density profile have also been calculated. Quadrupole deformation indicates a
... Show MoreUnderstanding the effects of fear, quadratic fixed effort harvesting, and predator-dependent refuge are essential topics in ecology. Accordingly, a modified Leslie–Gower prey–predator model incorporating these biological factors is mathematically modeled using the Beddington–DeAngelis type of functional response to describe the predation processes. The model’s qualitative features are investigated, including local equilibria stability, permanence, and global stability. Bifurcation analysis is carried out on the temporal model to identify local bifurcations such as transcritical, saddle-node, and Hopf bifurcation. A comprehensive numerical inquiry is carried out using MATLAB to verify the obtained theoretical findings and und
... Show MoreThe research problem was to identify the impact of monetary policies on economic growth in the oil and non-oil countries. The researcher chose the Republic of Iraq as an example for the oil countries and the Arab Republic of Egypt as an example for the non-oil countries to hold a comparison on the impact of monetary policies.
The research found that the monetary policies and their tools in the Iraqi economy affect the rate of GDP growth by 73%, which shows the strong impact of monetary policies on the economic growth in the Iraqi economy as an example of an oil state. GDP growth rate of 61%, indicating the impact of monetary policies on economic growth in the
Abstract
Personality is one of the most important elements that should be developed in university student. Thus, we have to develop the positive traits and neutralize the negative traits of students as well as we have to pay attention to the level of student achievement at the same time, the researcher designed a scale to measure the traits of study sample. The research come out with a number of recommendations and proposals, the most important of which Enhancing the positive characteristics of university students in order to reach them to the level of mature personality with mental health. Enhancing the positive role of the high level of achievement by motivating the stude
... Show MoreSome physical and chemical characteristics of Jurf Al- Sakar drinking water plant in Babylon governorate have been studied. Seven locations for this plant were selected. These were the drinking water treatment plant source on Euphrates River before entering the plant, precipitation, filtration and collection tanks, and also after leaving the plant at distances of one meter, 4 and 8 km. The samples were collected bimonthly from October, 2002 to August, 2003. Some results match with the national and international standard characters while the other characters (Turbidity, total hardness, calcium, nitrate, phosphate and the biological oxygen demand values) were not match. The present study showed that drinking water treatment plant is undrinka
... Show MorePurpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me