Preferred Language
Articles
/
jnhm-470
COMPARATIVE STUDY OF SEVERAL MORPHOLOGICAL AND REPRODUCTIONAL ASPECTS FOR SOME SPECIES OF THE BELLEVALIA LAPEYROUSE, 1808 AND ORNITHOGALUM LINNAEUS, 1753 (ASPARAGALES, ASPARAGACEAE) IN CENTRAL AND NORTH OF IRAQ
...Show More Authors

This study aims to study some morphological and reproductional characteristics in eleven species of two genera belonging to the family of Asparagaceae, which are Bellevalia Lapeyrouse, 1808 and Ornithogalum Linnaeus, 1753 and the species are: Bellevalia chrisii Yildirim and Sahin, 2014; Bellevalia flexuosa Boissier, 1854; Bellevalia kurdistanica Feinbrun, 1940; Bellevalia longipes Post, 1895; Bellevalia macrobotrys Boissier, 1853; Bellevalia paradoxa Boissier, 1882; Bellevalia parva Wendelbo, 1973; Bellevalia saviczii Woronow, 1927; Ornithogalum brachystachys C. Koch, 1849; Ornithogalum neurostegium Boissier, 1882 and Ornithogalum pyrenaicum Linnaeus, 1753. These species were identified and compared with each other; the results showed that there were differences between the two genera in studying the shape of bulbs, length of leaves and color of the flowers. Each of them showed an important taxonomic mark to be distinguished from the studied species. Morphological studies used with some characters of the reproductive, including the shape and color of the fruits, seeds and embryos were used to diagnoses the species. Also, the current investigation was found that the characteristics of the fruit and how it was connected to the pedicels was very important in the field of taxonomic and identification the species.
Two new record species were studied within the country, namely; Bellevalia chrisii and Bellevalia flexuosa; it should be noted here that the study of embryos is also one of the first studies conducted on these plants.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 29 2017
Journal Name
College Of Islamic Sciences
The illusion of al-Tabarsi in the kunya of Abi Jaafar in the interpretation of Majma' al-Bayan
...Show More Authors

 

The persons who Allah Ioves them in the holly Quran

Objectivity Study0Dr 0muyad Turky Ali 

Allah men tioned in Auran the loving of benevolent and who Allah loves him gave him everything 0the loving of benevolent came fist and after that the loving of justice who remove injustice and after that loving purified and in noeent 0After that mentioning loving of Knighters ( fighters )The eharity with money and to clear up the justice and loving purified is a reason of accessing paradise 0 

View Publication Preview PDF
Publication Date
Mon Aug 19 2024
Journal Name
Journal Of Ovonic Research
Synthesis of PPy- Nd2O3 nano-composite for utilization in supercapacitor applications
...Show More Authors

In this study, chemical oxidation was employed for the synthesis of polypyrrole (PPy) nanofiber. Furthermore, PPy has been subjected to treatment using nanoparticles of neodymium oxide (Nd2O3), which were produced and added in a certain ratio. The inquiry centered on the structural characteristics of the blend of polypyrrole and neodymium oxide after their combination. The investigation utilises X-ray diffraction (XRD), FTIR, and Field Emission Scanning Electron Microscopy (FE-SEM) for PPy, 10%, 30%, and 50% by volume of Nd2O3. According to the electrochemical tests, it has been noted that the nanocomposites exhibit a substantial amount of pseudocapacitive activity.

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of The College Of Languages (jcl)
Eyes of Optimism Look for Freedom in Langston Hughes' Selected Poems
...Show More Authors

The current study tackles how slavery and racial segregation, which have obviously made an enormous impact in the United States of America for many years, can be defeated through optimism. The study opens with an introduction that clarifies some background about Langston Hughes as a poet who writes against slavery and oppression done to the American Blacks during an era which was known for racial segregation in the United States of America. The poet sheds light , in his poetry, upon the role of African Americans in activating hope and optimism to get freedom which has been reached at the end. The first section of the study analyzes the meaning of slavery and segregation as reflected in some selected poems, showing the oppressive face of

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Designing system cost for water pollution plants in mayoralty of Baghdad
...Show More Authors

          There is an increase in the need for cost accounting in all organizations and from different sectors to provide detailed information to the totals of financial accounting, first and help solve problems associated with inventory and analysis, tabulation and allocation of cost elements II and do the planning process and provide the necessary oversight and help to take the right decisions such as pricing decisions that need to Information cost accounting.
And suffer most of the non-governmental organizations from the lack of a cost accounting system provides information on the cost of service in these organizations and the department research sample circle v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 08 2016
Journal Name
Methods In Molecular Biology
Production of Adjuvant-Loaded Biodegradable Particles for Use in Cancer Vaccines
...Show More Authors

View Publication
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2024
Journal Name
Tropical Journal Of Pharmaceutical Research
Validation of UV-visible spectrophotometric method for niclosamide in different media
...Show More Authors

Purpose: To validate a UV-visible spectrophotometric technique for evaluating niclosamide (NIC) concentration in different media across various values of pH. Methods: NIC was investigated using a UV-visible spectrophotometer in acidic buffer solution (ABS) of pH 1.2, deionized water (DW), and phosphate buffer solution (PBS), pH 7.4. The characterization of NIC was done with differential scanning calorimeter (DSC), powder X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The UV analysis was validated for accuracy, precision, linearity, and robustness. Results: The DSC spectra showed a single endothermic peak at 228.43 °C (corresponding to the melting point of NIC), while XRD and FTIR analysis confirmed the identit

... Show More
Scopus
Publication Date
Mon Feb 27 2023
Journal Name
Applied Sciences
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
...Show More Authors

Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an

... Show More
View Publication
Scopus (48)
Crossref (46)
Scopus Clarivate Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
In Situ Gelling Formulation of Naproxen for Oral Sustained Delivery System
...Show More Authors

Naproxen is non-steroidal anti-inflammatory drug, which has antipyretic and anti-inflammatory effect. It is extensively bound to plasma albumin, and exhibits gastric toxicity, so it may be more efficient to deliver the drug in its sustained release dosage form and adequate blood level is achieved. Three liquid formulations with in situ gelling properties have been assessed for their potential for the oral sustained delivery of naproxen . The formulations were dilute solutions of: (a) pectin; (b) gellan gum and; (c) sodium alginate, all containing complexed calcium ion that form gels when these ions are released in the acidic environment of the stomach . The viscosity of the sols and drug release were measured, and was found to be depende

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref