This study is conducted to determine the effect of pathogenicity of the fungus Lecanicillium lecanii in some aspects of life of the insect saw toothed beetle Oryzaephilus surinamensis L. (Coleoptera: Silvanidae) under laboratory conditions with three concentrations of spores and mildew commentator (1 × 103, 1 × 105, 1 × 107) spore / ml , on eggs and larvae second phase of the insect .The study also includs the effect of the fungus concentrations of germination on rice (jasmine) by using direct spray treatment. The results show great fungus efficiency in the control of some aspects of life of the insect, where varied efficiency depends on the concentration of spores, The highest percentage loss of eggs is 63.33% at a concentration
... Show MoreThe Migration is one of the important dynamic population movement phenomena in population studies because of its great impact in changing many demographic characteristics between the region of origin and arrival. And the multiplicity of forms and types according to the different reasons for it and the motives that prompted the population to move, as well as the currents and their size are also different according to the different causes, and here there are many types of migration, and many of them have been studied at the local and regional levels, and as long as the population is in a continuous dynamic movement, other types of migration are generated. (Al Douri, 2015, 230) &nbs
... Show MoreBackground: Hand, foot, and mouth disease is viral disease caused commonly by coxsackie virus A16 virus. It is a mild disease and children usually recover with no specific treatment within 7 to 10 days. Rarely, this illness may be associated with aseptic meningitis were patient may need hospitalization.
Objective: To determine significance of clinical features of hand, foot and mouth disease.
Methods: A cross sectional study of cases with clinical features of hand, foot and mouth disease visiting the dermatological consultation unit of Al Kindy teaching hospital. Sampling was for Zyona and Edressi Quarter patients over the period of 1st December 2017
... Show MoreThe relationship between respiratory diseases and natural geographical variables relative to temperature, relative humidity, wind and solar radiation is a strong one.
The environmental factors have impact on increasing the proportion of people with respiratory diseases in the province of Najaf, especially industrial pollution and working conditions as well as the economic level.
Ah-Mishkhab was in the first rank in terms of the number of people infected with respiratory diseases reached 135177 and 41%, followed by Najaf governorate which reached its numbers to 77801 and 23%. The district of Kufa ranked third with 42051 and 13%, and the other administrative units at fourth and fifth rank respectively.
When comparing diseases and
In recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of how the
... Show MoreIn recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreIn this work, a simple and very sensitive cloud point extraction (CPE) process was developed for the determination of trace amount of metoclopramide hydrochloride (MTH) in pharmaceutical dosage forms. The method is based on the extraction of the azo-dye results from the coupling reaction of diazotized MTH with p-coumaric acid (p-CA) using nonionic surfactant (Triton X114). The extracted azo-dye in the surfactant rich phase was dissolved in ethanol and detected spectrophotometrically at λmax 480 nm. The reaction was studied using both batch and CPE methods (with and without extraction) and a simple comparison between the two methods was performed. The conditions that may be affected by the extraction process and the sensitivity of m
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More