This study aims at examining and confirming the patterns of phenetic relationships and the levels of variations within and among the species of Lotus L., 1753 in Egypt by using morphometric analysis techniques. We have evaluated 24 morphological characters from about 300 herbarium specimens representing 19 species of Lotus that are currently recognized. Based on numerical analyses of macromorphological characters (cluster analysis, principal coordinate analysis and principal component analysis), 19 species of Lotus were recognized from Egypt. These species were clustered in six species-specific groups: (I) Lotus halophilus Boiss. & Spruner, L. angustissimus L., L. glinoides Delile and L. schimperi Steud. ex Boiss., (II) Lotus glaber Mill. and L. palustris Willd., (III) Lotus polyphyllos E.D. Clarke, L. creticus L. and L. cytisoides L., (IV) Lotus gebelia Vent., L. lanuginosus Vent. and L. arenarius Brot., (V) Lotus edulis L., L. tetragonolobus L. and L. conjugatus L. and (VI) Lotus ornithopodioides L., L. peregrinus L., L. arabicus L. and L. hebranicus Hochst. ex Brand.
As a result of this study, we proposed that some characters, not previously examined in detail, showed significant characters in species delimitation: pod length, seed dimensions, features of upper and lower leaflets, calyx, length of corolla, length of style, numbers of flowers and ovules.
With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MoreThis study is a numerical analysis of the transition process from the second to the third mode in transformer oil. In this study, it was determined how to change from the second to the third mode, which is thought to be a precursor to the process of electrical breakdown, which results in a significant loss of electrical energy and harm to electrical devices and equipment. The initiation time, length, rate of propagation velocity, and radius of the streamer discharge were determined. The transition from the second to the third mode during the electrical discharge process may lead to the occurrence of an electrical breakdown, which is one of the greatest challenges facing scientists and engineers who deal with the
... Show MoreA water resources management for earthen canal/stream is introduced through creating a combination procedure between a field study and the scientific analytical concepts that distinguish the hydraulic problems on this type of stream with using the facilities that are available in HECRAS software; aiming to point the solutions of these problems. Al Mahawil stream is an earthen canal which is subjected to periodic changes in cross sections due to scour, deposition, and incorrect periodic dredging processes due to growth of the Ceratophyllum plants and weeds on the bed and banks of the stream; which affect the characteristics of the flow. This research aims to present a strategy of water resources management through a field study that conducte
... Show MoreThe food web is a crucial conceptual tool for understanding the dynamics of energy transfer in an ecosystem, as well as the feeding relationships among species within a community. It also reveals species interactions and community structure. As a result, an ecological food web system with two predators competing for prey while experiencing fear was developed and studied. The properties of the solution of the system were determined, and all potential equilibrium points were identified. The dynamic behavior in their immediate surroundings was examined both locally and globally. The system’s persistence demands were calculated, and all conceivable forms of local bifurcations were investigated. With the aid of MATLAB, a numerical simu
... Show MoreIn this study, two types of local plants were chosen, the first is the plant golden pothos Epipremnum aureum and the second is the Iraqi Sheikh's chin plant Tribulus terrestris L, for the purpose of making a comparison between them in terms of their possession of chemical groups with antioxidant activity in order to use them as a natural alternative to using antioxidants Industrial that cause negative effects on human health, the samples were prepared using the method of water and alcohol extraction (ethanol 70%) for both plants. It revealed the presence of a number of chemical groups (tannins, carbohydrates, phenols, flavonoids, alkaloids) for both plants, the aqueous and alcoholic extracts. Coumarins are only found in the sheikh's chin pl
... Show MoreWe define L-contraction mapping in the setting of D-metric spaces analogous to L-contraction mappings [1] in complete metric spaces. Also, give a definition for general D- matric spaces.And then prove the existence of fixed point for more general class of mappings in generalized D-metric spaces.
Pandemic COVID-19 is a contagious disease affecting more than 200 countries, territories, and regions. Recently, Iraq is one of the countries that have immensely suffered from this outbreak. The Kurdistan Region of Iraq (KRI) is also prone to the disease. Until now, more than 23,000 confirmed cases have been recorded in the region. Since the onset of the COVID-19 in Wuhan, based on epidemiological modelling, researchers have used various models to predict the future of the epidemic and the time of peak, yielding diverse numbers in different countries. This study aims to estimate the basic reproductive number [R0] for COVID-19 in KRI, using the standard SIR (Susceptible-Infected-Removed) epidemic model. A system of non
... Show MoreThe purpose of this paper is to study new types of open sets in bitopological spaces. We shall introduce the concepts of L- pre-open and L-semi-p-open sets
A geological model was built for the Sadi reservoir, located at the Halfaya oil field. It is regarded as one of the most significant oilfields in Iraq. The study includes several steps, the most essential of which was importing well logs from six oil wells to the Interactive Petrophysics software for conducting interpretation and analysis to calculate the petrophysical properties such as permeability, porosity, shale volume, water saturation, and NTG and then importing maps and the well tops to the Petrel software to build the 3D-Geological model and to calculate the value of the original oil in place. Three geological surfaces were produced for all Sadi units based on well-top data and the top Sadi structural map. The reservoir has
... Show MoreThe main problem of the current study concentrates on applying critical discourse analysis to examine textual, discoursal and social features of reduplication in some selected English newspaper headlines. The main aim of the current study is to analyze the linguistic features of reduplication by adopting Fairclough's three-dimensional model (2001). This study sets forth the following hypotheses: (1) English headline – newspapers comprise various textual, discoursal and social features ;(2)the model of analysis is best suited for the current study.To achieve the aims and verify the hypotheses, a critical discourse analysis approach is used represented by Fairclough's socio-cultural approach (2001).The present study has examined the use of
... Show More