Jatropha L. is an exotic genus to Iraq and it has been cultivated in gardens for ornamental purposes because of the shiny red color of the flowers. The plant adapted to environmental conditions and succeeded in growing and blooming, which is why the species was interested to study. The species Jatropha integerrima Jacq. was examined and diagnosed for the first time in Iraq. Morphological and anatomical characteristics for leaves (considering that the variations are the most reliable and taxonomically important) were provided. The Phytochemical screening showed the presence of alkaloids, flavonoids, terpenes, tannins and saponins. The qualitative analysis by TLC indicated the presence of alkaloids and flavonoid that was detected by special reagent and UV light, which included two orang spots of alkaloid with 0.71 and 0.63 Rf value one flavonoid yellow spot with 0.43 Rf value.
One eighth of the bird species in the world is considered globally threatened; the avifauna of Iraq comprises 409 species and is considered as the major indicator of the health of Iraq’s biological resources. The Iraqi geography falls into five main regions among which is the desert and semi-desert areas which cover much of the country area. Al-Najaf desert is still one of the poorly known regions from the biodiversity point of view. Birds of conservation concern are detected in Al-Najaf desert during 31 field trips to 20 sites conducted from August 2018 to April 2020, (citing literature records, and personal interviews with locals).The factors caused the bird numbers to decline in Al-Najaf desert include hunting and trapping, logging,
... Show MoreThis work includes a detailed description of the Leucostoma nigricorpuris sp. nov. from
Iraq. Locality, host plants and data of collection were given.
The COVID-19 pandemic has necessitated new methods for controlling the spread of the virus, and machine learning (ML) holds promise in this regard. Our study aims to explore the latest ML algorithms utilized for COVID-19 prediction, with a focus on their potential to optimize decision-making and resource allocation during peak periods of the pandemic. Our review stands out from others as it concentrates primarily on ML methods for disease prediction.To conduct this scoping review, we performed a Google Scholar literature search using "COVID-19," "prediction," and "machine learning" as keywords, with a custom range from 2020 to 2022. Of the 99 articles that were screened for eligibility, we selected 20 for the final review.Our system
... Show MoreAny software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show MoreImage databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show More