This study was contacted on Orchidaceae, it is a second largest family in flowering plants, comes
after Asteraceae, and approximately has 25,000–30,000 species in 750–800 genera in the world.
This study included 10 genera, Anacamptis (five species), Androrchis (two species),
Cephalanthera (one species), Dactylorhiza (three species), Epipactis (two species),
Himantoglossum (two species), Limodorum (one species), Neotinea (one species), Ophrys (seven
species ), and Orchis (four species). The name abbreviation of authors of plant names follows the
International Plant Name Index (IPNI) (https://www.ipni.org/). Images of type collections of most
species were checked on virtual herbaria (https://herbarium.univie.ac.at/database/search.php) and
JSTOR Global Plants (https://plants.jstor.org/). The taxonomic status, geographical distribution,
and the conservation status for all taxa were provided.
The petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli
... Show MoreRecent developments in technology and the area of digital communications have rendered digital images increasingly susceptible to tampering and alteration by persons who are not authorized to do so. This may appear to be acceptable, especially if an image editing process is necessary to delete or add a particular scene that improves the quality the image. But what about images used in authorized governmental transactions? The consequences can be severe; any altered document is considered forged under the law and may cause confusion. Also, any document that cannot be verified as being authentic is regarded as a fake and cannot be used, inflicting harm on people. The suggested work intends to reduce fraud in electronic documents u
... Show MoreThe concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show MoreThe aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreThe present work is an attempt to develop design data for an Iraqi roof and wall constructions using the latest ASHRAE Radiant Time Series (RTS) cooling load calculation method. The work involves calculation of cooling load theoretically by introducing the design data for Iraq, and verifies the results experimentally by field measurements. Technical specifications of Iraqi construction materials are used to derive the conduction time factors that needed in RTS method calculations. Special software published by Oklahoma state university is used to extract the conduction factors according to the technical specifications of Iraqi construction materials. Good agreement between the average theoretical and measured cooli
... Show MoreInelastic electron scattering have been studied for (3.68 )
2
1
2
3
MeV
,
(7.55 )
2
1
2
5
MeV
(15.11 )
2
3
2
3
MeV
states in the 13C nucleus. 4He is considered as an inert core with
nine nucleons out of it (the model space of nucleus). Form factors are calculated by
using Cohen-Kurath interaction for 1p-shell model space with Modified Surface
Delta Interaction (MSDI) as a residual interaction for higher configuration. The
study of core-polarization effects on the form factors is based on microscopic
theory, which combines shell model wave functions and configurations with higher
energy as the first order perturbation. The radial wave functions
The Population growth and decay issues are one of the most pressing issues in many sectors of study. These issues can be found in physics, chemistry, social science, biology, and zoology, among other subjects.
We introduced the solution for these problems in this paper by using the SEJI (Sadiq- Emad- Jinan) integral transform, which has some mathematical properties that we use in our solutions. We also presented the SEJI transform for some functions, followed by the inverse of the SEJI integral transform for these functions. After that, we demonstrate how to use the SEJI transform to tackle population growth and decay problems by presenting two applications that demonstrate how to use this transform to obtain solutions.
Fin
... Show More