Preferred Language
Articles
/
9xhzCJcBVTCNdQwCKZTY
Molecular Detection and Antiserum Preparation of Begomoviruses Infecting Zucchini Squash in Iraq
...Show More Authors
Abstract<p>Begomoviruses infecting zucchini squash were investigated. Leaf samples were collected from zucchini squash growing areas in Baghdad (Jhadryaa and Yusufiyah), Babylon (Jibela and Mahmudiyah) and Diyala (Khan Bani Saad) Provinces. Samples were screened for the presence of begomoviruses using polymerase chain reaction (PCR) and Deng genus specific primers. Sixteen out of 40 samples were begomovirus positive. Sequence analysis confirmed the detection of Tomato leaf curl Palampur virus (TLCPALV) <italic>Begomovirus solanumpalampurense</italic>, Squash leaf curl virus (SLCuV) <italic>B. cucurbitapeponis</italic> and Tomato yellow leaf curl virus (TYLCV) <italic>B. coheni</italic> in zucchini squash and <italic>Datura stramonium</italic> samples. Co-infections of <italic>B. solanumpalampurense</italic>, and <italic>B. cucurbitapeponis</italic>, <italic>B. solanumpalampurense</italic> and <italic>B. coheni</italic> were detected in most samples suggesting begomovirus mixed infections are common in the investigated zucchini squash fields. <italic>Datura stramonium</italic> can be an alternatives host to <italic>B. solanumpalampurense</italic> and <italic>B. coheni</italic>. Total protein extracted from begomovirus infected samples were injected into lab rats to prepare begomovirus specific antibodies. The resultant polyclonal antibodies were labeled using horseradish peroxidase and enzyme linked immune assay (ELISA) was performed. Antibodies prepared could detect begomovirus in infected samples scoring 1.247 highest absorbance value at 405 nm compared to 1.198 of slandered TYLCV antigen. Proteins extracted from begomovirus co-infected tissues can be used to immunize rats for the production of beganovirus specific polyclonal antibodies.</p>
Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 10 2023
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Detection of Multiple Sclerosis Lesions in Supra- and Infra-Tentorial Anatomical Regions by Double Inversion Recovery, Flair, and T2 MRI Sequences: A Comparative Study in Iraqi Patients
...Show More Authors

Background: In young adults, multiple sclerosis is a prevalent chronic inflammatory demyelinating condition. It is characterized by white matter affection, but many individuals also have significant gray matter involvement. A double-inversion recovery pulse (DIR) pattern was recently proposed to improve the visibility of multiple sclerosis lesions. Objective: To find out how well a DIR sequence, FLAIR, and T2-weighted pulse sequences can find MS lesions in the supratentorial and infratentorial regions. Methods: A total of 37 patients with established diagnoses of multiple sclerosis were included in this cross-sectional study. Brain MRI was done using double inversion recovery, T2, and FLAIR sequences. The number of lesions was count

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Mon Oct 01 2012
Journal Name
The Iraqi Journal Of Agricultural Science
EVALUATION AND PERFORMANCE COMPARISON OF MOLD BOARD AND DISC PLOW IN SOILS OF CENTRAL IRAQ
...Show More Authors

The experiment was conducted to evaluate and performance comparison for moldboard and disk plows in central of Iraq in 2011. Three factor were used in this study included Two types of plows included moldboard and disk plows which represented main plot , three forward speeds of the tillage was second factor included 1.85, 3.75 and 5.62 km / h which represented sup plot , and three levels of soil moisture was third factor included 21 , 18 and 14 % to determined data actual plow depth , Practical productivity, Volume of disturbed soil, Field efficiency , Slippage percentage in silt clay loam soil with depth 22 cm were studied in the experiment Split – split plot design under randomized complete block design with three replications using

... Show More
Preview PDF
Publication Date
Sun Oct 02 2011
Journal Name
The Iraqi Journal Of Agricultural Sciences
AN ECONOMIC ANALYSIS OF PRODUCTION AND CONSUMPTION OF SUGAR CANE AND SUGAR BEET IN IRAQ
...Show More Authors

In spite of economic importance of sugar cane and sugar beet as they described as industrial crops they still face decreasing rates of production and productivity in Iraq , and their production was not able to satisfy the local industrial demands for sugar . Thus this study aimed at studying and analyzing, production and productivity of sugar cane and sugar beet in Iraq and this has been done by using non serial data that can be obtained from official offices in Iraq . The area and production of sugar cane in Iraq recorded positive annual growth rates during 1970- 1978 which were 6% and 5% consequently , while the productivity of sugar cane recorded at the same duration of time negative annual growth rate which was 1% , while they recorded

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The reality of bee breeding in Iraq and ways to develop it
...Show More Authors

This study was (the reality of beekeeping in Iraq and ways of developing them) as a research project in the branch of production is important branches of the productivity of the agricultural sector in Iraq, and the importance of this section, productive (beekeeping) for the agricultural sector in his contribution to increase the vegetable production and improve the quality and the various Classes of types, through its active role in the pollination of plants and indirectly (when the bees to move between plants to collect nectar and pollen grains), which contributes to reduce the losses in plant production and raise the rate of productivity per donum of various agricultural crops.

On the other hand play a

... Show More
View Publication Preview PDF
Crossref