This research dealt with study of cladistics taxonomy of five species related to the genus Rumex L. and Polygonum L. from family polygonaceae in Iraq by using Mesquite software V.2.75. This research support strongly delimiting the species P. aviculare L. and P. lapathifolia L.as suggested in floras publication while R. dentatus L. is setted in single group whereas R. vesicarius L. and R. conglomeratus Murray were included in the same group. Also, this study involved characteristics of shape, dimensions, color, and ornamentation of seeds and fruits as the seed forms were ranging from lenticular to trigonous. In terms of size calculations, the seeds of R. vesicarius was recorded the higher range (4.0- 4.5) mm in length while, P. aviculare recorded the lowest (1.5-1) mm in length. However, the shape was lenticular in P. lapathifolia and trigonous in the remaining species. Color of seeds and surface ornamentation is recognized. fruits shape is an important characters in identification of selected species as two groups are distinguished: persistent tubercules tepals which are spine teeth in R. dentatus and tongue like shape in R. conglomeratus, the second group is persistent tepals which are papery in P. lapathifolia, biconvex in P. aviculare and cordate to winged as in R. vesicarius beside that, colors, dimensions and surface nature is also recorded.
The earth-air heat exchanger (EHX) has a promising potential to passively save the energy consumption of traditional air conditioning systems while maintaining a high degree of indoor comfort. The use of EHX systems for air conditioning in commercial and industrial settings offers several environmental benefits and is capable of operating in both standalone and hybrid modes. This study tests the performance and effectiveness of an EHX design in a sandy soil area in Baghdad, Iraq. The area has a climate of the subtropical semi-humid type. Ambient air temperatures and soil temperatures were recorded throughout the months of 2021. During the months of January and June, the temperatures of the inlet and outflow air at varying air veloci
... Show MoreAbstract: The study aimed to investigate the effect of oral administration of hot aqueous extract of beetle cocoon Larinus maculatus Faldermann, in a two doses 50 and100mg/Kg/B.wt for 3 and 6 weeks respectively on the levels of serum glucose, weight of body, and lipid profile in male mice Mus musculus. The results revealed that there was a significant (p<0.05) decrease in serum glucose level was dose and period dependent. Weight of body also reduced significantly (p<0.05) with doses and period dependent. The lipid profile level significantly (p<0.05) decreased in dose and period’s manner in each of Total cholesterol (TC), Triglyceride (TG), High Density Lipoprotein- (HDL), Low Density Lipoprotein (LDL), and Very Low Density Lipoprotei
... Show MoreComplexes of Lanthanide ione Ln(III) =La(III) , Ce(III),Pr(III) and Nd(III) withligands of nicotinamide (na) and Benzimidazole (BIMD) have been prepared withgeneral formula [M(na)3(BIMD)3](NO3) where :M = Ln(III) = La(III) , Ce(III) , Gd(III) , Nd(III) .Na = nicotinamide = C7H6N2OBIMD = Benzimidazole = C7H6N2All compounds have been characterized by spectroscopic methods [FT-IR , UV-VIS ,AAS] , microanalysis (C.H.N) Along with conductivity measurements , solubility ,melting point , theroitical measurment by using chem office 3D prog .Model (2000) .Frome the above data the proposed moleculer structure for all complexes with its ionsis octahydral geometries
Five membered heterocyclics derivatives were synthesized in this work by three routes. The first route includes the synthesis of N-benzoic acid 1,2,3,-triazole derivatives (3),(4) by diazotation of methyl-2-amino benzoate and treating the resulted salt (1) with sodium azide and ethyl acetoacetate or acetyl acetone, respectively. In the second route, derivatives of pyrazole (8) pyrazolin-5-one (9), (10) were prepared by the reaction of the salt (1) with some active methylene compounds to give the corresponding hydrazones derivatives (5-7) which then they were treated with hydrazine hydrate. The third route afforded the synthesis of three derivatives (12), (15a), (15b) of thiazolidinone by two different methods. AII compounds were confirmed b
... Show MoreCondensation of 1,2- dibromo ethane with para hydroxy benzoic acid gave 1,2-Ethane-bis- 4-oxybenzoic [1]. This Compound was converted with the thionyl chloride to give 1,2-Ethane-bis- 4-oxybenzoyl chloride [2]. Reaction of compound [2] with thiosemicarbizades gave 1,2-Ethanebis[4-oxybenzoyl-thiosemicarbazide] [3] and opteined 1,2-Ethane-bis[3-mercapto-5-phenoxy- 1,2,4-triazole] [4] from treatment compound [3] with NaOH (4%) .The new compounds 1,2- Ethane-bis[3-(substituted thioacyl)-4-(substituted acyl)-5 phenoxy-1,2,4-triazole] [5a-d] and 1,2- Ethane-bis[3-(substituted alkylthio)-5 phenoxy-1,2,4-trizole] [5e-f] derived from compound [4] were synthesized and characterized by physical and spectral data. All the compounds [4], [5a-d] and [5e-
... Show MoreNew 2-amino thiazole ,oxodiazole, sulphonilamide and diazin derivatives of N-(α-chloro aceto)-3-(tolyl imino)-5-bromo-2-oxo-indole(2) have been synthesized .The preparation process started by the reaction of 5-bromo isatin with P-toluidine in the presence of glacial acetic acid and dimethylformamide(DMF) as a solvent to give 3-(tolyl imino)5-bromo-1H-indole-2-one.(1), Compound (1) with sodium hydride in dimethylformamide(DMF) at 0C0 gave a suspension of the sodium salt of Schiff base derivative and subsequent reaction with monochloroacetylchloride obtained the intermediate compound(2).Compound(2) was reacted with different reagents in four routes.The first route involved direct reaction with substituted 2-aminobenzothiazole u
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More