This research dealt with study of cladistics taxonomy of five species related to the genus Rumex L. and Polygonum L. from family polygonaceae in Iraq by using Mesquite software V.2.75. This research support strongly delimiting the species P. aviculare L. and P. lapathifolia L.as suggested in floras publication while R. dentatus L. is setted in single group whereas R. vesicarius L. and R. conglomeratus Murray were included in the same group. Also, this study involved characteristics of shape, dimensions, color, and ornamentation of seeds and fruits as the seed forms were ranging from lenticular to trigonous. In terms of size calculations, the seeds of R. vesicarius was recorded the higher range (4.0- 4.5) mm in length while, P. aviculare recorded the lowest (1.5-1) mm in length. However, the shape was lenticular in P. lapathifolia and trigonous in the remaining species. Color of seeds and surface ornamentation is recognized. fruits shape is an important characters in identification of selected species as two groups are distinguished: persistent tubercules tepals which are spine teeth in R. dentatus and tongue like shape in R. conglomeratus, the second group is persistent tepals which are papery in P. lapathifolia, biconvex in P. aviculare and cordate to winged as in R. vesicarius beside that, colors, dimensions and surface nature is also recorded.
Background: Atrioventricular nodal reentrant tachycardia (AVNRT) is the commonest regular supraventricular tachyarrhythmia. Ablation in the area of slow pathway (SP) has been successfully implemented in every day clinical electrophysiological practice for more than 20 years. Although the procedure is generally regarded as effective and safe, data on long-term effects and predictors of success or failure are incomplete.
An effort is made to study the effect of composite nanocoating using aluminum-9%wt silicon alloys reinforced with different percentage (0.5,1,2,4)wt.% of carbon nanotubes (CNTs) using plasma spraying. The effect of this composite on corrosion behavior for AA6061-T6 by extrapolation Tafel test in sea water 3.5wt% NaCl was invested. Many specimens where prepared from AA6061-T6 by the dimension (15x15x3)mm as this first set up and other steps include coating process, X-ray diffraction and SEM examination .The results show the CNTs increase the corrosion rate of the nanocomposite coatings with increasing the weight percentage of CNTs within the Al-Si matrix. Al-9wt%Si coating layer itself has less corrosion rate if compared with both n
... Show MoreMany conservative sphincter-preserving procedures had been described to be effective in
healing of anal fistula without excision or de roofing.
Objective: To verify the outcome of mere photocoagulation of the fistula tract on healing of low anal
fistula.
Materials and Methods: Using 810nm diode laser, the tracts of low anal fistulae in a cohorts of six male
patients (mean age of 32 yr) had been photocoagulated by retrograde application of laser light through an
orb tip optical fiber threaded in to the tract. Swabs for culture and sensitivity testing were obtained before
and after laser application. Patients were followed up regularly to announce fistula healing.
Results: Mean laser exposure time was 6.6 min., mean
This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.
It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<
... Show MoreDue to increasing cost of asphalt binder, significant economic savings can be realized by using the amount from reclaimed asphalt pavement (RAP) in the production of new hot mix asphalt (HMA). Moreover, this is an environmentally friendly option as it reduces the demand for virgin materials. It has to be remarked that in Iraq RAP is not used in the production of HMA and this valuable material is mostly degraded for use in lower value applications. Four mixtures were designed, which contains three different percent RAP, it is (0%, 5%, 15%) with asphalt grade (40-50) and (25%) with asphalt grade (60-70), it has been changed the grade of asphalt when adding RAP (25%) to compensate for the aged binder in the RAP when adding to mixture. All type
... Show MoreImage classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More