The present study reports Morchella conica Pers.1818, which belongs to the family, Morchellaceae as a new record of Iraqi macromycota based on the morphological and molecular methods. During their short and often sporadic fruiting season, this fungal species was found in mixed forest unburned areas in Branan ranges (Suliamaniya Province, Northeast Iraq). Currently, M. conica is the second Morchella species reported from Iraq. The current study aimed to introduce this new record, which is poorly studied in the Middle East. M. conica is morphologically described and phylogenetically confirmed. The relationship between this species and other species within the genus was studied using the nrDNA ITS sequences from different species and diverse geographical regions. Maximum likelihood (ML) analyses were also conducted to build the molecular phylogeny of this species. The results of the presented species are essential for assessing the genus geographic distribution and developing information about species of this highly prized edible, industrial medicinal fungus.
The Mauddud Formation was one of the important and widespread Lower Cretaceous period formations in Iraq. It has been studied in three wells (EB. 55, EB. 58, and EB. 59) within the East Baghdad Oil Field, Baghdad, central Iraq. 280 thin sections were studied by microscope to determine fauna, the formation composed of limestone and dolomitized limestone in some parts which tends to be marl in some parts, forty species and genus of benthic foraminifera have been identified beside algae and other fossils, three biozones have been identified in the range which is: Orbitolina qatarica range zone (Late Albian), Orbitolina sefini range zone (Late Albian – Early Cenomanian) and Orbitolina concava range zone (Early Cenomanian), The age of
... Show MoreThe Quantitative high-resolution planktonic foraminiferal analysis of the subsurface section in three selected wells in the Ajeel Oil Field (Aj-8, Aj-12, and Aj-15) in Tikrit Governorate, Central Iraq has revealed that Shiranish Formation deposited in Late Campanian- Latest Maastrichtian age. This formation consists mainly of marly and marly limestone yielding diverse planktonic foraminiferal assemblages and calcareous benthic foraminifera, with a total of 46 species that belong to 23 genera, Three zones and four subzones, which cover the Late Campanian to the Latest Maastrichtian, were identified based on the recorded planktonic foraminifera and their ranges. They are as follows:1. Globotruncana aegyptiaca Zone that dated to be Lat
... Show MoreEnzyme activity were studied in the sera of children with leukemia than healthy children, where 31 cases were studied, including 21 cases of patients with acute lymphatic leukemia
ABSTRACT : This research involves the synthesis of five to seven heterocyclic compounds starting with Schiff’s bases which derived from oxime as a starting material. 1.3-oxazepine derivatives were prepared from adding different anhydrides to the Schiff bases, tetrazole and thiazolidinone derivatives synthesized from add sodium azide and thioglycolic acid to the same Schiff’s bases as a five members ring. Pyrimidine derivatives were prepared after the reaction of the azomethine group with acetyl chloride and then urea and thiourea to synthesis on derivatives contain the six members ring. Another step included identified and confirmed these compounds by FT- IR, 1HNMR, TLC and 13CNMR finally, step included the assay of biological activity
... Show MoreVerrucae vulgares are commonly encountered. The present work is designed in an attempt to build a systematic procedure for treating warts by carbon dioxide laser regarding dose parameters, application parameters and laser safety.
Patients and Methods: The study done in the department of dermatology in Al-Najaf Teaching Hospital in Najaf, Iraq. Forty-two patients completed the study and follow up period for 3 months. Recalcitrant and extensive warts were selected to enter the study. Carbon dioxide laser in a continuous mode, in non-contact application, with 1 mm spot size was used. The patients were divided into two groups. The first group of patients consisted of 60 lesions divided to 6 equal groups, in whom we use different outputs a
This paper deals with constructing mixed probability distribution from mixing exponential
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called