Begomoviruses infecting zucchini squash were investigated. Leaf samples were collected from zucchini squash growing areas in Baghdad (Jhadryaa and Yusufiyah), Babylon (Jibela and Mahmudiyah) and Diyala (Khan Bani Saad) Provinces. Samples were screened for the presence of begomoviruses using polymerase chain reaction (PCR) and Deng genus specific primers. Sixteen out of 40 samples were begomovirus positive. Sequence analysis confirmed the detection of Tomato leaf curl Palampur virus (TLCPALV)
The current study was conducted to find out the effect of the sediment source (sedimentary of Iraqi-Iranian borderline and Tigris River) on the content and distribution of feldspar minerals and their effect on the optical properties of these minerals in some soils of Wasit and Maysan province. Eight pedons were chosen to represent the study area, five of them represented sediments coming from the borderline, which included pedons of (Badra, Taj Al-Din, Al-Shihabi, Jassan, and Galat), while two of them represent the sediments of the Tigris River (Essaouira, Al-Dabouni). Finally, the pedon of Ali Al-Gharbi represented the mixing area of sediments of all the torrents coming from borderline and the sediments of the Tigris River. The diagnostic
... Show MoreThe study focused on the results of first paleostress from thrust fault slip data on Tertiary age of Hemrin North Structure, North of Iraq. The stress inversion was performed for fault slip data using an improved right dihedral model, and then followed by rotational optimization (Georient Software). The trend of the principal stress axes (σ1, σ2 and σ3) and the ratio of the principal stress differences (R) show the main paleostress field is NE-SW compression regime. As well as using Lisle graph and Mohr diagram to determine the magnitudes of palestress. The values paleostress of the study area were σ1=1430 bars, σ2=632 bars and σ3=166 bar. The large magnitudes of the primary stress axes could be attributed to active tecto
... Show MoreThe title takes its realistic connotations with its symbols, slogans and historical extensions in Iraq, also, the repercussions of the organic crisis that afflicted it for almost half a century, especially after the abortion of the July 14 Revolution and the spread of the culture of weapons, violence and death that we are living in Iraq nowadays.
The topic is suitable for critical analytical studies carried out by specialists in scientific and academic research centers and cultural institutions because they have an important feasibility at the strategic cultural level in Iraq, the Middle East and the world.
Research in Iraq has fallen to the extreme and is no longer effective, to the extent that it represents a severe cri
... Show MoreThe research includes the synthesis and identification of the mixed ligands complexes of M+2ions in general composition[M(Asn)2(SMX)] Where L- Aspargine (C4H8N2O3)symbolized (AsnH) as a primary ligand and Sulfamethoxazole(C10H11N3O3S) symbolized (SMX) as a secondary ligand. The ligands and the metal chlorides were brought in to reaction at room temperature in(v/v) ethanol /water as solvent containing NaOH. The reaction required the following [(metal: 2(Na+Asn-): (SMX)] molar ratios with M(II) ions, Where: M(II)=Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II). The UV–Vis and magnetic moment data revealed an octahedral geometry around M(II), The conductivity data show a non-electrolytic nature of the complexes. The antimicrobial a
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show More