Leishmaniasis is one of the important parasitic diseases, affecting mainly low social class people indeveloping countries, and is more prevalent and endemic in the tropical and subtropical regions of old worldand new world. Despite ofbroad distribution in Iraq,little known about the geneticcharacteristics of thecausative agents. So this study was aimed to evaluate the genetic varietyoftwo IraqiLeishmaniatropicaisolatesbased on heat shock protein gene sequence 70 (HSP70) in comparison with universal isolates recordedsequences data. After amplification and sequencing of HSP70 gene,the obtainedresults were alignment alongwith homologous Leishmania sequences retrieved from NCBI by using BLAST. The analysis results showedpresence of particular gene mutations including substitution and insertion at 93% identity with the HSP70 gene.So,indicate the prescient of numeric variation of local isolate and this is the first step toward future phylogenicstudy to understand genomic diversity across Leishmania tropica parasite
The growing water demand has raised serious concerns about the future of irrigated agriculture in many parts all over the world, changing environmental conditions and shortage of water (especially in Iraq) have led to the need for a new system that efficiently manages the irrigation of crops. With the increasing population growing at a rapid pace, traditional agriculture will have a tough time meeting future food demands. Water availability and conservation are major concerns for farmers. The configuration of the smart irrigation system was designed based on data specific to the parameters concerning the characteristics of the plant and the properties of soil which are measured once i
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreThis research aims to identify the means and forms of interactive communication concerning Iraqi topics on the websites of global radio stations, namely Sawa and Monte Carlo. It also seeks to uncover the editorial and artistic interactions related to Iraqi topics on the selected websites chosen as the research sample, comparing them with the editorial interaction within the Iraqi context between the Radio Monte Carlo and Sawa websites.
The research yields several conclusions, including the following:
Iraqis focus their interaction with topics related to Iraq on Facebook for both Radio Monte Carlo and Sawa; Arabs show higher levels of interaction on Twitter with Radio Monte Carlo; Participants on the webs
Assessment should give more attention on the learning achievement of the curriculum. Portfolio- based learning assessment (PBLA) is utilized in language learning materials recently .It is assessment tools to test the learners’ learning for instance open-ended problem solving, and creative and critical thinking, imaginative, reflective, have the capacity to apply their information in new issues, and to express oral and composing. This paper aims to discover the impact of utilizing (PBLA) on students’ performance at College of Education (Ibn –Rushd) in English Department the third stage. To fulfill the aim, a sample of the study is (64) EFL students of two groups. The study used a test and an instrument design .The test group ut
... Show MoreAbstract.The goal of this article is to find the CEO of Iraqi companies that use strategic planning and determine if they are capable of diagnosing the traits of strategic planning systems that improve these companies' capacity to successfully address crisis-related needs. The capacity of the company to successfully react to crisis needs and demands is enhanced by the use of strategic planning, according to a review of data from 64 enterprises utilizing statistical analysis. Furthermore, top and division or unit managers must be involved and committed for strategic planning to be successful. It also has to be planned with an external orientation and get more than just lip service from top and unit or division level managers. In other words,
... Show Moreالهدف من الدراسة هو معرفة أثر استراتيجيات التفكير البصري (VTS) على تحصيل طلاب الكلية في مهارات الاتصال باللغة الإنكليزية. ولتحقيق هدف الدراسة تم استخدام التصميم البعدي التجريبي. وتمثلت العينة بـ (70) من طلاب المرحلة الثانية بقسم اللغة الإنجليزية بكلية التربية. وقد تم اختيارهم عشوائياً وتقسيمهم إلى مجموعتين: المجموعة التجريبية والضابطة (35) طالباً في كل مجموعة. ولتحقيق هدف الدراسة تم بناء اختبار تحصيلي لمهارا
... Show MoreIraq has the second largest proven oil reserves in the world. According to oil experts, it is expected that the Iraq's reserves to rise to 200+ billion barrels of high-grade crude.
Oil is a strategic commodity for producing and exporting countries in general, and Iraq in particular, as demonstrated by the international experience that oil is an important means to achieve economic growth, an important tool in the overall economic, social and political development. It is also an important source of hard currency for any national economy and a means to connect the local economy and the global economy. In this paper we focus our attention on selecting the best regression model that explain the effect of human capita
... Show More