Genetic diversity was studied in 31 Iraqi common reed samples , which were collected from Iraqi marshes in Basrah , Messan and Thi-Qar provinces and also from different areas in Baghdad province . Random amplified polymorphic DNA (RAPD) technique was used for evaluation of genetic diversity between collected samples . Seven primers were used for polymorphism detecting between common reed samples . The results revealed 102 bands for the all samples when RAPD-PCR was used . The percentage rate for the monomorphic bands is 6.86% , while the percentage rate for the polymorphic bands is 93.13% , and the numbers of these bands are ranging between 10 to 17 for each used primer . The UBC1 primer gave the highest number of polymorphic bands with 17 bands , while the M13 and Op-B01 primers gave the lowest number of polymorphic bands with 10 bands . The mean value of polymorphic bands is 13.5 for each used primer , while the percentage mean ratio for polymorphism is 92.67% , ranging between 71.42% for M13 primer and 100 % for UBC1 and Op-B11 primers . The results of dendrogram analysis for the RAPD data by using unweighted pair-group method with arithmetic average (UPGMA) were showed that almost common reed samples were distributed in six main groups with 60% in similarity . These six groups showed coincidence with their geographic area . The samples which collected from one location or from same province were clustered in one group , while the Meshab and Sallal (Basrah) isolated samples were segregated from the other samples . The genetic variations between isolated common reeds have advantage in weeds control by using chemical or other methods
This study investigates the improvement of Iraqi atmospheric gas oil characteristics which contains 1.402 wt. % sulfur content and 16.88 wt. % aromatic content supplied from Al-Dura Refinery by using hydrodesulfurization (HDS) process using Ti-Ni-Mo/γ-Al2O3 prepared catalyst in order to achieve low sulfur and aromatic saturation gas oil. Hydrodearomatization (HDA) occurs simultaneously with hydrodesulfurization (HDS) process. The effect of titanium on the conventional catalyst Ni-Mo/γ-Al2O3 was investigated by physical adsorption and catalytic activity test. Ti-Ni-Mo/γ-Al2O3 catalyst was prepared under vacuum impregnation condition to ensure efficient precipitation of metals within the carrier γ-Al2O3. The loading percentage of met
... Show MoreBackground:Plant-derived compounds have action alongside Gram-positive and Gram-negative bacteria and numerous compounds, inhibit efflux pumps and hence have become known as efflux pump inhibitors. Clarithromycin is a macrolide antibiotic used to treat pharyngitis, tonsillitis, acute maxillary sinusitis and acute bacterial exacerbation of chronic bronchitis the antibacterial range is the similar as erythromycin but it is active against Mycobacterium avium complex, M.leprae and atypical mycobacteria. The in vitro antibacterial activity results of different boswellic acid compounds discovered alpha keto-boswellic acid (AKBA) to be the preponderance potent antibacterial compound alongside Gram-positive pathogens, but it showed no significant a
... Show MoreSteganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.
Intended for getting good estimates with more accurate results, we must choose the appropriate method of estimation. Most of the equations in classical methods are linear equations and finding analytical solutions to such equations is very difficult. Some estimators are inefficient because of problems in solving these equations. In this paper, we will estimate the survival function of censored data by using one of the most important artificial intelligence algorithms that is called the genetic algorithm to get optimal estimates for parameters Weibull distribution with two parameters. This leads to optimal estimates of the survival function. The genetic algorithm is employed in the method of moment, the least squares method and the weighted
... Show MoreMost recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or
... Show MoreIn this work, InSe thin films were deposited on glass substrates by thermal evaporation technique with a deposit rate of (2.5∓0.2) nm/sec. The thickness of the films was around (300∓10) nm, and the thin films were annealed at (100, 200 and 300)°C. The structural, morphology, and optical properties of Indium selenide thin films were studied using X-ray diffraction, Scanning Electron Microscope and UV–Visible spectrometry respectively. X-ray diffraction analyses showed that the as deposited thin films have amorphous structures. At annealing temperature of 100°C and 200°C, the films show enhanced crystalline nature, but at 300°C the film shows a polycrystalline structure with Rhombohedral phase with crystallites size of 17.459 nm. Th
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show More