Preferred Language
Articles
/
Txb4uYsBVTCNdQwCHNhs
Molecular detection of ‘<i>Candidatus</i> Phytoplasma australasia’ and ‘<i>Ca.</i> P. cynodontis’ in Iraq
...Show More Authors
Abstract<p>The association of phytoplasma was investigated in symptomatic tomato (<italic>Solanum lycopersicum</italic> L.), eggplant (<italic>Solanum melongen</italic> L.), mallow (<italic>Malva</italic> spp.) and Bermuda grass (<italic>Cynodon dactylon</italic> L.) plants exhibiting witches’ broom and white leaf diseases, respectively. Total DNA was extracted from tomato (n=3), eggplant (n=2), mallow (n=2) and Bermuda grass (n=8) samples. Direct polymerase chain reaction (PCR) was performed using P1/P7 primer set, then PCR products were sequenced. Sequences obtained from tomato, eggplant and mallow shared 99% maximum nucleotide identity with phytoplasma belonging to subgroup 16SrII-D, and resulted therefore ‘<italic>Candidatus</italic> Phytoplasma australasia’-related. Sequences obtained from Bermuda grass showed 100% maximum nucleotide identity to 16SrXIV-A subgroup and were ‘<italic>Ca</italic>. P. cynodontis’-related. The study presents the first molecular confirmation and sequence data of presence of ‘<italic>Ca.</italic> P. australasia’ and ‘<italic>Ca</italic>. P. cynodontis’ in Iraq.</p>
Scopus Crossref
View Publication
Publication Date
Wed May 04 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Knee Meniscus Segmentation and Tear Detection Based On Magnitic Resonacis Images: A Review of Literature
...Show More Authors

The meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when

... Show More
Publication Date
Wed Jan 01 2014
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sci
Multiple Mixing Ratios of Gamma Rays Reaction 32 70 70 33 Ge p n As (, ) γ Using a2-ratio Method.
...Show More Authors

The δ-mixing of γ-transitions in 70As populated in the 32 70 70 33 Ge p n As (, ) γ reaction is calculated in the present work by using the a2-ratio methods. In one work we applied this method for two cases, the first one is for pure transition and the sacend one is for non pure transition, We take into account the experimental a2-coefficient for previous works and δ -values for one transition only.The results obtained are, in general, in a good agreement within associated errors, with those reported previously , the discrepancies that occur are due to inaccuracies existing in the experimental data of the previous works.

Publication Date
Tue Dec 19 2023
Journal Name
Bulletin Of The Iraq Natural History Museum
CHECKLIST OF BIVALVIA (MOLLUSCA) IN IRAQ
...Show More Authors

This study presents a comprehensive list of the freshwater and marine bivalves distributed in Iraq. A total of 51 species were recorded, and distributed as: 14 freshwater species, and 37 marine species, these species belonging to 25 families, all available remarks on the distribution, taxonomy, and nomenclature of these species were given. This study included the recently collected specimens along with those previously studied and recorded in Iraq.

Scopus (1)
Scopus Crossref
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
Occurrence of Pneumococcal Meningitis in Iraq
...Show More Authors

This study focuses on the relative frequency of Streptococcus pneumoniae in children with culture-proven bacterial meningitis. The epidemiology has been investigated with clinical and laboratory findings in The Central Public Health Laboratory, Iraq from April to September, 2010. From (138) samples , (55) cases (39.85 %) were diagnosed by physician as bacterial meningitis, (23) cases (16.66 %) as viral menginitis , (18) cases (13.04 %) as different medical cases (e.g febrile convulsion , meningoencephalitis , epilepsy …etc) and (42) cases (30.43 %) as unidentified medical cases. For bacterial meningitis S.pneumoniae was isolated from (10) cases (18.18 %) only. The median age for bacterial meningitis was (130.75) month and the predomina

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 03 2023
Journal Name
Hind
Diversity of Freshwater Fishes in Iraq
...Show More Authors

Many studies have focused on identifying and classifying freshwater fishes in Iraq, concerned with describing, organizing, and drawing up a list of freshwater fishes in Iraq or the Tigris and Euphrates rivers. Within the most recent updates at the beginning of 2023, 53 native freshwater and 20 exotic (alien or introduced) fish species are recorded and described. This study reviewed the database of morphology and molecular studies of freshwater fish in Iraq and reported species while surveying the fish fauna at different water bodies of the country from 2010 to the beginning of 2023. In conclusion, 29 species (about 40.3%) of all 72 fish species in Iraq still need to be available information on their molecular data.

Scopus (3)
Scopus
Publication Date
Sun Jul 01 1990
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
NATURAL ENEMIES OF WHITEFLIES IN IRAQ
...Show More Authors

During the syrvey on natural enemies of whiteflies in Iraq, the following. predators were recorded.

View Publication Preview PDF
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Preparation, characterization, antioxidant activity of 1-(2-furoyl) thiourea derivatives and study the molecular docking of them as potent inhibitors of Urease enzyme
...Show More Authors

In this work, we synthesized thirteen compounds of 1-(2-furoyl)thiourea derivatives 1-13 by conversion of 2-furoyl chloride to 2-furoyl isothiocyanate by reacting it with potassium thiocyanate in dry acetone in a quite short reflux time then, in the same pot, different of (primary and secondary amines) were added individually to achieve thiourea derivatives. The products were characterized spectroscopically using (FT-IR, 1H NMR and 13C NMR) techniques. Some of them were evaluated as antioxidant agents using DPPH radical scavenging method, and all were examined theoretically as enzyme inhibitors against Bacillus pasteurii urease (pdb id: 4ubp) and  by studying  molecular docking using Autodock (4.2.6) software.

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref