Abstract. Hassan FM, Mahdi WM, Al-Haideri HH, Kamil DW. 2022. Identification of new species record of Cyanophyceae in Diyala River, Iraq based on 16S rRNA sequence data. Biodiversitas 23: 5239-5246. The biodiversity and water quality of the Diyala River require screening water in terms of biological contamination, because it is the only water source in Diyala City and is used for many purposes. This study aimed to identify a new species record of Cynaophyceae and emphasize the importance of using molecular methods beside classic morphological approaches, particularly in the water-shrinkage-aqua system. Five different sites along Diyala River were selected for Cyanophyceae identification. Morphological examination and 16S rRNA sequence analysis was conducted, and the phylogenetic tree was constructed using Mega 6 Programme. The morphological examination of samples showed a total of 28 species corresponds to Cyanophyceae, including one species of Spirulina. In our study of 28 identified species, three new species record were identified in Diyala River. The newly recorded species were confirmed by 16S rRNA and the phylogenetic tree construction. The species are registered in the National Centre for Biotechnology Information (NCBI) with the following accession numbers: Arthrospira indica (MW854667.1), Arthrospira platensis (MW854665.1), and Limnospira fusiformis (MW854666.1). Most notably, Arthrospira platensis is not listed in the checklist of Iraqi algae. Thus, these species are considered as a new record of Iraqi algal flora. The identification of new species record in Diyala River reflexes the impact of climate change on this river, and the necessity to use 16S rRNA to identify microalgae in all ecosystems.
A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreThis article describes how to predict different types of multiple reflections in pre-track seismic data. The characteristics of multiple reflections can be expressed as a combination of the characteristics of primary reflections. Multiple velocities always come in lower magnitude than the primaries, this is the base for separating them during Normal Move Out correction. The muting procedure is applied in Time-Velocity analysis domain. Semblance plot is used to diagnose multiples availability and judgment for muting dimensions. This processing procedure is used to eliminate internal multiples from real 2D seismic data from southern Iraq in two stages. The first is conventional Normal Move Out correction and velocity auto picking and
... Show MoreThis paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreThe most common form of childhood cancer is leukemia, Calculation for more than one third of all childhood cancers among those ages 1 day – 14 years. The diseases of leukemia are worldwide, it occurred in both genders from male and females and in all age. A total of 80 different samples of patient children were collected from the central teaching hospital of pediatric in Baghdad. Obtained during the period from 1st Sept. 2019 till the 31 th of Aug. 2020. Each isolates identification by using Vitek 2. Isolated organism in leukemic children show 18 (22.5 %) gram positive and 62 (77.5 %) gram negative from the total sample 80 (100.0 %). The percent of male is 45 more than female which represents 35 in most age groups between age (1 d
... Show MoreThe Vulnerable Indian Roofed Turtle Pangshura tecta (Gray, 1831) (Testudines: Geoemydidae) occurs in the Sub-Himalayan lowlands of India, Nepal, Bangladesh, and Pakistan. Little is known about its natural history, no studies have been conducted revealing its natural predators. In this study, a group of Large-billed Crow Corvus macrorhynchos Wagler, 1827 (Passeriformes: Corvidae) was observed hunting and predating on an Indian Roofed Turtle carcass in the bank of river Kuakhai, Bhubaneswar, India. The first record of this predation behaviour is reported and substantiated by photographic evidence.
The bit record is a part from the daily drilling report which is contain information about the type and the number of the bit that is used to drill the well, also contain data about the used weight on bit WOB ,revolution per minute RPM , rate of penetration ROP, pump pressure ,footage drilled and bit dull grade. Generally we can say that the bit record is a rich brief about the bit life in the hole. The main purpose of this research is to select the suitable bit to drill the next oil wells because the right bit selection avoid us more than one problems, on the other hand, the wrong bit selection cause more than one problem. Many methods are related to bit selection, this research is familiar with four of thos
... Show MoreBig data analysis is essential for modern applications in areas such as healthcare, assistive technology, intelligent transportation, environment and climate monitoring. Traditional algorithms in data mining and machine learning do not scale well with data size. Mining and learning from big data need time and memory efficient techniques, albeit the cost of possible loss in accuracy. We have developed a data aggregation structure to summarize data with large number of instances and data generated from multiple data sources. Data are aggregated at multiple resolutions and resolution provides a trade-off between efficiency and accuracy. The structure is built once, updated incrementally, and serves as a common data input for multiple mining an
... Show More