This research dealt with study of cladistics taxonomy of five species related to the genus Rumex L. and Polygonum L. from family polygonaceae in Iraq by using Mesquite software V.2.75. This research support strongly delimiting the species P. aviculare L. and P. lapathifolia L.as suggested in floras publication while R. dentatus L. is setted in single group whereas R. vesicarius L. and R. conglomeratus Murray were included in the same group. Also, this study involved characteristics of shape, dimensions, color, and ornamentation of seeds and fruits as the seed forms were ranging from lenticular to trigonous. In terms of size calculations, the seeds of R. vesicarius was recorded the higher range (4.0- 4.5) mm in length while, P. aviculare recorded the lowest (1.5-1) mm in length. However, the shape was lenticular in P. lapathifolia and trigonous in the remaining species. Color of seeds and surface ornamentation is recognized. fruits shape is an important characters in identification of selected species as two groups are distinguished: persistent tubercules tepals which are spine teeth in R. dentatus and tongue like shape in R. conglomeratus, the second group is persistent tepals which are papery in P. lapathifolia, biconvex in P. aviculare and cordate to winged as in R. vesicarius beside that, colors, dimensions and surface nature is also recorded.
Big data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However
... Show MoreThe present study attempts to identify some of the differences between the skull bones of two species Cyprinus carpio and Carassius carassius, which belong to the Cyprinidae family. The study is a taxonomic diagnostic study between the two species which are considered local fish abundant in the Iraqi aquatic environment
The shale volume is one of the most important properties that can be computed depending on gamma ray log. The shale volume of Mishrif Formation (carbonate formation from middle Cenomanian- early Turonian) was studied for the regional area of the middle and southern parts of Iraq. The gamma ray log data from seventeen wells ( Kf-3,Kf-4, Ad-1,Ad -2,Dh-1, Bu-47, Ns-2, Ns-4, Am-1,Am-2,Hf-2,Hf-115,Mj-3,Mj-15, Su-7,Wq-15 and Lu-7) distributed in the study area were used to compute the shale volume of Mishrif Formation. From the available data of the considered wells, a regional isopach map of Mishrif Formation was obtained. The isopach map indicates that the maximum thickness of Mishrif Formation is located at the eastern part of t
... Show More Thsst researcher problem of delays faced by researchers are all waiting to evaluate their standards by the experts who must take their views to extract the truth Virtual important step first step in building standards whatsoever, then the difference of opinion among experts about the paragraphs Whatever the scope of their functions, leading to confusion in maintaining these paragraphs or delete? Or ignore the views and opinion of the researcher to maintain the same? Or as agreed upon with the supervisor if he was a student? Especially if the concepts of a modern new building.
Therefore, the researcher sought to try to find a solution to her problem to conduct an experiment to test building steps
This study deals with the application of surface-consistent deconvolution to the two-dimensional seismic data applied to the Block 11 area within the administrative boundaries of Najaf and Muthanna Governorates with an area of 4822 , the processed seismic data of line (7Gn 21) is 54 km long. The study was conducted within the Processing Department of the Oil Exploration Company. The gap surface- consistent deconvolution was applied using best results of the parameters applied were: The length of the operator 240, the gap operator 24, the white noise 0.01%, the seismic sections of this type showed improvement with the decay of the existing complications and thus give a good continuity of the reflectors
... Show MoreThe present study deals with processing of one seismic line (2WL2) with a length of (37km) for (2D) seismic data of west Luhais area that is located within the administrative borders of the province of Muthanna in south of Iraq. The quality of the recorded data of this line is in general weak due to the effect of noise mainly. The study was made up in oil Exploration Company by utilizing OMEGA software which consists of a great number of the processing programs. The elevation static correction and residual static correction were applied on the studied line and the final section were resulted after completing the treatment processes that proceed followed of the static correction process and the result of elevation static correcting was go
... Show MoreTwo species of monogenetic trematodes of the genus Dactylogyrus were recorded in the present paper for the first time in Iraq from two freshwater fishes from Diyala river, Diyala province. The first species, D. bocageii Alvarez Pellitero, Vicente et Gonzalez Lanza, 1981 was recorded from gills of Aspius vorax, the second species, D. lenkorani Mikailov, 1967 was recorded from gills of Barbus sharpeyi. The descriptions and measurements of these parasites as well as their illustrations were given.
Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show MoreA total of 50 wells water samples were collected from 10 wells in Abu Ghraib site/ Baghdad for detection of coliform, fecal coliformand and pseudomonas aeruginosa bacteria, and the pollution of toxic ions (No3-, B+3, pb+2 and Cd+2 ) in wells water. Results showed microbial pollution by coliform, fecal Coliform bacteria in wells water when using presumptive, confirmed and complete tests, P. aeruginosa bacterium was isolated and identificated on Cetrimide Agar media, estimated the Most Probable Number (MPN) of coliforms and P. aeruginosa, results showed difference in mean of (MPN) of wells water. Most of toxic ions concentrations were low comparing with the recommended hygienic standards from the World Health Organization (WHO). Wells wate
... Show More