This research includes a detaile description of new species Rhyncomya irakensis sp. nov.
from Iraq.
Localities distribution, host plants and data of collection were recorded.
The presented research investigated the pollen morphology of endemic Iraqi Hypericum species. The study revealed phenotypic features of pollen grains in the polar and equatorial views and their quantitative and qualitative characteristics. The results showed that the pollen grains of the genus Hypericum were radially symmetrical and isopolar, and their apertures were simple and tricolporate, except the species H. davisii, distinguished as tetracolprate. Dividing the studied species based on pollen grain sizes comprised two groups. Small pollen grains with an average length of the equatorial view ranged between 10–16 μm in H. lysimachioides and H. vermiculare. Medium-sized pollen grains with an average extent between 17–26 μm e
... Show MoreAdhrt all fungal biological control ability Tdhadah less than 2 repel Alaftran Almamradan showed leaky mushroom Biological control is thermally laboratories and different concentrations of 5, 10 and 20% inhibition in the growth of fungus colonies amounted to 3.8 cm and 3.1 and 2.4 respectively in comparison with control 9 cm
Recently, some prostate cancer patients have acquired resistance to the second -generation drugs (anzalutamide and apalutamide) prescribed for the treatment of this disease due to the emergence of the F876L mutation, which represents a challenge to modern medicine. In this study, a new series of 2-thiohydantoin derivatives were prepared through the reaction of different derivatives of maleimide (1c-4c) with isothiocyanate derivatives. The prepared compounds were diagnosed using FT-IR,1H-NMR ,13C-NMR, Mass spectra. The prepared series compounds has been studied against prostate cancer cells. The MTT assay was used to determine the activity of the prepared compounds against prostate cancer cells. The da
... Show MoreRwanga (view) movement is a new Kurdish poetry movement. Some poets and modern storywriters published a manifest in 1970. They have made a group of changes in the content and appearance of Kurdish poetry. They were under the influence of western literature schools such as Surrealism, Dadaism and Existentialism. Likewise, the impact of the new Arabic literature that appeared by the end of 1960s on them was obvious as they were imitating such literatures. Nevertheless, the condition of Kurdistan at that time was in need of a new literature to express that new stage. Sherko Bekas was one of those poets who became the dynamo of the poetic movement in which the rebellion spirit was embodied in the modern way of dealing with culture, rhyme, rh
... Show MoreThe synthesis, characterization and mesomorphic properties of two new series of triazine-core based liquid crystals have been investigated. The amino triazine derivatives were characterized by elemental analysis, Fourier transforms infrared (FTIR), 1HNMR and mass spectroscopy. The liquid crystalline properties of these compounds were examined by differential scanning calorimetry (DSC) and polarizing optical microscopy (POM). DSC and POM confirmed nematic (N) and columnar mesophase textures of the materials. The formation of mesomorphic properties was found to be dependent on the number of methylene unit in alkoxy side chains.
Green synthesis methods have emerged as favorable techniques for the synthesis of nano-oxides due to their simplicity, cost-effectiveness, eco-friendliness, and non-toxicity. In this study, Nickel oxide nanoparticles (NiO-NPs) were synthesized using the aqueous extract of Laurus nobilis leaves as a natural capping agent. The synthesized NiO-NPs were employed as an adsorbent for the removal of Biebrich Scarlet (BS) dye from aqueous solution using adsorption technique. Comprehensive characterization of NiO-NPs was performed using various techniques such as atomic force microscopy (AFM), Fourier transform infrared (FTIR), X-ray diffraction (XRD), Brunauer-Emmett and Teller (BET) analysis, and scanning electron microscopy (SEM). Additionally, o
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreA new method for determination of allopurinol in microgram level depending on its ability to reduce the yellow absorption spectrum of (I-3) at maximum wavelength ( ?max 350nm) . The optimum conditions such as "concentration of reactant materials , time of sitting and order of addition were studied to get a high sensitivity ( ? = 27229 l.mole-1.cm-1) sandal sensitivity : 0.0053 µg cm-2 ,with wide range of calibration curve ( 1 – 9 µg.ml-1 ) good stability (more then24 hr.) and repeatability ( RSD % : 2.1 -2.6 % ) , the Recovery % : ( 98.17 – 100.5 % ) , the Erel % ( 0.50 -1.83 % ) and the interference's of Xanthine , Cystein , Creatinine , Urea and the Glucose in 20 , 40 , 60 fold of analyate were also studied .
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More