This research dealt with study of cladistics taxonomy of five species related to the genus Rumex L. and Polygonum L. from family polygonaceae in Iraq by using Mesquite software V.2.75. This research support strongly delimiting the species P. aviculare L. and P. lapathifolia L.as suggested in floras publication while R. dentatus L. is setted in single group whereas R. vesicarius L. and R. conglomeratus Murray were included in the same group. Also, this study involved characteristics of shape, dimensions, color, and ornamentation of seeds and fruits as the seed forms were ranging from lenticular to trigonous. In terms of size calculations, the seeds of R. vesicarius was recorded the higher range (4.0- 4.5) mm in length while, P. aviculare recorded the lowest (1.5-1) mm in length. However, the shape was lenticular in P. lapathifolia and trigonous in the remaining species. Color of seeds and surface ornamentation is recognized. fruits shape is an important characters in identification of selected species as two groups are distinguished: persistent tubercules tepals which are spine teeth in R. dentatus and tongue like shape in R. conglomeratus, the second group is persistent tepals which are papery in P. lapathifolia, biconvex in P. aviculare and cordate to winged as in R. vesicarius beside that, colors, dimensions and surface nature is also recorded.
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreCarbonate-clastic succession which includes the Shu'aiba, Nahr Umr and Mauddud formations are representing a part of the Barremian-Aptian Sequence (Wasi'a Group). The present study includes three boreholes (Ba-1, 4 and 8) within the Balad Oil Field. The study area is located in central Iraq. This field represents a subsurface anticline with a northwest to southeast direction axis within the Mesopotamian Zone. Eight types of microfacies were recognized in the succession of the Mauddud and Shu’aiba formations. These microfacies represent shallow open marine, restricted and semi-restricted, reef - back reef, deep open marine and basinal depositional environments. While Nahr Umr Formation includes two successions, the first is the upp
... Show MoreIraq is located near the northern tip of the Arabian plate, which is advancing northwards relative to the Eurasian plate, and is predictably, a tectonically active country. Seismic activity in Iraq increased significantly during the last decade. So structural and geotechnical engineers have been giving increasing attention to the design of buildings for earthquake resistance. Dynamic properties play a vital role in the design of structures subjected to seismic load. The main objective of this study is to prepare a data base for the dynamic properties of different soils in seismic active zones in Iraq using the results of cross hole and down hole tests. From the data base collected it has been observed that the average ve
... Show More
The process of soil classification in Iraq for industrial purposes is important topics that need to be extensive and specialized studies. In order for the advancement of reality service and industrial in our dear country, that a lot of scientific research touched upon the soil classification in the agricultural, commercial and other fields. No source and research can be found that touched upon the classification of land for industrial purposes directly. In this research specialized programs have been used such as geographic information system software The geographical information system permits the study of local distribution of phenomena, activities and the aims that can be determined in the loca
Accurate predictive tools for VLE calculation are always needed. A new method is introduced for VLE calculation which is very simple to apply with very good results compared with previously used methods. It does not need any physical property except each binary system need tow constants only. Also, this method can be applied to calculate VLE data for any binary system at any polarity or from any group family. But the system binary should not confirm an azeotrope. This new method is expanding in application to cover a range of temperature. This expansion does not need anything except the application of the new proposed form with the system of two constants. This method with its development is applied to 56 binary mixtures with 1120 equili
... Show MoreToxoplasma gondii is an opportunistic pathogen in which the reactivation of a latent infection can cause death in congenitally infected fetuses, newborns, and immunocompromised patients. This study aimed to determine the seropositivity of toxoplasmosis infection and the possible association with Interleukin-12 (IL-12) and Interleukin-23 (IL-23) cytokines in breast cancer patients. In this study, 190 women were enrolled. All serum samples were tested for T. gondii immunoglobulins (IgG and IgM) antibodies and (IL-12, IL-23) levels using ELISA technique. The result of this study showed that breast cancer patients recorded the highest percentage of toxoplasmosis infection. There were no positivity rates for anti- Toxopl
... Show MoreThe use analysis value chain such information in the provision as financial so information quality meet and satisfy the needs of users such information , particularly investors and lenders as the identification needs financial information and the knowledge as their behavior influenced by that information can be based on the accounting profession to focus on improving their function in order to achieve its goal that satisfying their needs and rationalize their decisions . In accounting thought discovered fertile ground for users preferences as one of the entrances theorising positive which is based on the need to include knowledge on accounting hypothesis that explain the
... Show More