The present study reports Morchella conica Pers.1818, which belongs to the family, Morchellaceae as a new record of Iraqi macromycota based on the morphological and molecular methods. During their short and often sporadic fruiting season, this fungal species was found in mixed forest unburned areas in Branan ranges (Suliamaniya Province, Northeast Iraq). Currently, M. conica is the second Morchella species reported from Iraq. The current study aimed to introduce this new record, which is poorly studied in the Middle East. M. conica is morphologically described and phylogenetically confirmed. The relationship between this species and other species within the genus was studied using the nrDNA ITS sequences from different species and diverse geographical regions. Maximum likelihood (ML) analyses were also conducted to build the molecular phylogeny of this species. The results of the presented species are essential for assessing the genus geographic distribution and developing information about species of this highly prized edible, industrial medicinal fungus.
Background. In cases of spontaneous subarachnoid haemorrhage (SAH) with multiple intracranial aneurysms (MIAs) detected on angiography, some radiological clues assist in determining the site of a ruptured aneurysm which is bleeding is quite beneficial for the selection of the best treatment strategy. Case description. We report a case of a 60 years old patient who presented with spontaneous SAH, sellar hematoma, and three different aneurysms detected in angiography. Although the right Posterior communicating artery (PcomA) aneurysms showed Murphy’s teat on angiography intraoperatively, we discovered that the right superior hypophyseal aneurysm (SHA) was the source of the index bleeding. Both aneurysms were clipped successfully. Co
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreRwanga (view) movement is a new Kurdish poetry movement. Some poets and modern storywriters published a manifest in 1970. They have made a group of changes in the content and appearance of Kurdish poetry. They were under the influence of western literature schools such as Surrealism, Dadaism and Existentialism. Likewise, the impact of the new Arabic literature that appeared by the end of 1960s on them was obvious as they were imitating such literatures. Nevertheless, the condition of Kurdistan at that time was in need of a new literature to express that new stage. Sherko Bekas was one of those poets who became the dynamo of the poetic movement in which the rebellion spirit was embodied in the modern way of dealing with culture, rhyme, rh
... Show MoreThe synthesis, characterization and mesomorphic properties of two new series of triazine-core based liquid crystals have been investigated. The amino triazine derivatives were characterized by elemental analysis, Fourier transforms infrared (FTIR), 1HNMR and mass spectroscopy. The liquid crystalline properties of these compounds were examined by differential scanning calorimetry (DSC) and polarizing optical microscopy (POM). DSC and POM confirmed nematic (N) and columnar mesophase textures of the materials. The formation of mesomorphic properties was found to be dependent on the number of methylene unit in alkoxy side chains.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis study is unique in this field. It represents a mix of three branches of technology: photometry, spectroscopy, and image processing. The work treats the image by treating each pixel in the image based on its color, where the color means a specific wavelength on the RGB line; therefore, any image will have many wavelengths from all its pixels. The results of the study are specific and identify the elements on the nucleus’s surface of a comet, not only the details but also their mapping on the nucleus. The work considered 12 elements in two comets (Temple 1 and 67P/Churyumoy-Gerasimenko). The elements have strong emission lines in the visible range, which were recognized by our MATLAB program in the treatment of the image. The percen
... Show More