The antiviral activity of leaf extracts from Datura stramonium and tomato plants inoculated with TMV, combined with 20% skimmed milk, was investigated. A TMV isolate was confirmed using bioassay, serological, and molecular approaches and subsequently used to inoculate plants. Tomato plants, both pre- and post-inoculated with TMV, were sprayed with leaf extracts from either TMV-free or infected plants, alone or mixed with 20% skimmed milk. Enzyme-linked immunosorbent assay (ELISA) using tobamovirus-specific antibodies and local lesion tests were conducted to assess antiviral activity based on virus concentration and infectivity in treated plants. The experiment followed a completely randomized design (CRD), and the Least Significant Difference (LSD) test was applied to evaluate ELISA optical density (OD) values. OD data revealed that the combination treatment (inoculated tomato leaf extract + 20% skimmed milk) inhibited TMV in tomato plants by up to 56%, showing the highest antiviral activity. This study is the first to investigate the antiviral potential of leaf extracts from TMV-infected plants.
At the heart of every robust economy is a vital banking system. The functional banking system can effectively perform several functions such as mobilizing savings, allocating credit, monitoring managers, transforming risks, and facilitating the financial transactions. This paper aims to measure the impact of banking system development on economic growth in Iraq. Credit to private sector divided by GDP used as a proxy of banking development. Real per capita GDP used as a proxy of economic growth. By using Autoregressive Distributed Lag (ARDL) model, the paper finds that the undeveloped Iraqi banking system could not promote economic growth in the country. Therefore, a variety of policies need to be taken to spur the role of bankin
... Show MoreFinancial inclusion refers to the access of financial services at low cost and high-quality from the formal financial sector to all segments of society, especially marginalized groups, and then use and benefit from them. Financial inclusion is also associated with banking stability, as well as with financial integrity and financial protection for the consumer, therefore, it achieves a number of objectives, the most important of which is to support and enhance banking stability. This is what made it attract the attention of many countries and central banks recently.
The study aims to show the impact of financial inclusion indicators on ban
... Show MoreObjective(s): The aim of this study is to assess the impact of social phobia upon self-esteem of nursing
collegians.
Methodology: A Cross-sectional study is carried out at University of Baghdad, Karkuk, Thi-Qar, and Kufa,
colleges of nursing from Feb 8
th
, 2011 to Sep. 25th, 2011. A sample of all first class nursing collegians (N=330)
were selected from a probability sample of nursing colleges by dividing Iraq to three geographical areas (South,
North, and Middle Euphrates) in addition to Baghdad. The data were collected through the use of selfadministered
technique as a mean for data collection, by using a questionnaire that consists of three parts:
First part was the socio-demographic data form; the second o
Ecosystems provide humans with services that include benefits from food, fresh water, climate regulation, and socio-economic assets. The Mesopotamian marshlands are among the largest wetlands in the Middle East and they provide various benefits. However, ecosystem services of the Marshlands are consistently undervalued in national economic analysis and decision making. This study focusses on the Central Marshes, the first National Park in Iraq, and is the first attempt at valuing a series of ecosystem services from a valuable natural ecosystem in Iraq. We adopted the Toolkit for Ecosystem Services Site-Based Assessment (TESSA) for the determination of biophysical and economic values of services at the site level. Data on key ecosystem se
... Show MoreIn this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More