Preferred Language
Articles
/
Txb4uYsBVTCNdQwCHNhs
Molecular detection of ‘<i>Candidatus</i> Phytoplasma australasia’ and ‘<i>Ca.</i> P. cynodontis’ in Iraq
...Show More Authors
Abstract<p>The association of phytoplasma was investigated in symptomatic tomato (<italic>Solanum lycopersicum</italic> L.), eggplant (<italic>Solanum melongen</italic> L.), mallow (<italic>Malva</italic> spp.) and Bermuda grass (<italic>Cynodon dactylon</italic> L.) plants exhibiting witches’ broom and white leaf diseases, respectively. Total DNA was extracted from tomato (n=3), eggplant (n=2), mallow (n=2) and Bermuda grass (n=8) samples. Direct polymerase chain reaction (PCR) was performed using P1/P7 primer set, then PCR products were sequenced. Sequences obtained from tomato, eggplant and mallow shared 99% maximum nucleotide identity with phytoplasma belonging to subgroup 16SrII-D, and resulted therefore ‘<italic>Candidatus</italic> Phytoplasma australasia’-related. Sequences obtained from Bermuda grass showed 100% maximum nucleotide identity to 16SrXIV-A subgroup and were ‘<italic>Ca</italic>. P. cynodontis’-related. The study presents the first molecular confirmation and sequence data of presence of ‘<italic>Ca.</italic> P. australasia’ and ‘<italic>Ca</italic>. P. cynodontis’ in Iraq.</p>
Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
The political image of Kurds and ideological representation in the Arab novel in Iraq
...Show More Authors

The novels that we have addressed in the research, Including those with the ideological and political ideology, It's carry a negative image for the Kurds without any attempt to understand, empathy and the separation between politics and the people, The novels were deformation of the image, Like tongue of the former authority which speaks their ideas, Such as (Freedom heads bagged, Happy sorrows Tuesdays for Jassim Alrassif, and Under the dogs skies for Salah Salah). The rest of novels (Life is a moment for Salam Ibrahim, The country night for Jassim Halawi, The rib for Hameed Aleqabi). These are novels contained a scene carries a negative image among many other social images, some positive, and can be described as neutral novels. We can

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 23 2018
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Phytochemical and Pharmacological Study of Valepotriates in Valeriana officinalis L. F.Valerianeceae Cultivated in Iraq
...Show More Authors

This study concerned with phytochemical investigation and methods of extraction and separation of active constituents from Valeriana officinalis plant cultivated in Iraq. Due to the large number of active constituents in Valeriana officinalis, it was necessary to make analytical study of its constituents to determine the chemical nature of these constituents and then determine the main classes (terpenes and iridoids) using chemical reagents specific for each class. Different organic solvents like ethanol (70%) used in soxhlet apparatus and hexane, ethyl acetate and methanol were used separately to extract the main active constituents by maceration. Through comparison between these solvents using thin layer chromatograph

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
The Social Dimension and Its Role in the Applicability of Smart Cities in Iraq
...Show More Authors
Abstract<p>Smart cities are using innovative technological solutions to improve the quality of life and service that citizens and visitors receive. Defined as a digital or ecological city, its services depend on information and communication technology infrastructure, such as intelligent automated traffic systems, advanced security management Services, building systems, and the use of automation in offices and homes. The global trend now towards smart cities, sustainable and green cities and other cities, with different nomenclature, the common denominator is the comfort of the individual and the preservation of natural resources. Adopting smart, sustainable, green, or healthy cities is either t</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 10 2023
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Detection of Multiple Sclerosis Lesions in Supra- and Infra-Tentorial Anatomical Regions by Double Inversion Recovery, Flair, and T2 MRI Sequences: A Comparative Study in Iraqi Patients
...Show More Authors

Background: In young adults, multiple sclerosis is a prevalent chronic inflammatory demyelinating condition. It is characterized by white matter affection, but many individuals also have significant gray matter involvement. A double-inversion recovery pulse (DIR) pattern was recently proposed to improve the visibility of multiple sclerosis lesions. Objective: To find out how well a DIR sequence, FLAIR, and T2-weighted pulse sequences can find MS lesions in the supratentorial and infratentorial regions. Methods: A total of 37 patients with established diagnoses of multiple sclerosis were included in this cross-sectional study. Brain MRI was done using double inversion recovery, T2, and FLAIR sequences. The number of lesions was count

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
IXODIOD TICK FAUNA INFESTING SHEEP AND GOATS IN THE MIDDLE AND SOUTH OF IRAQ
...Show More Authors

    A total of 215 sheep and 87 goats were carefully searched for ixodid ticks from January to December 2015 at different regions of the middle and south of Iraq. The detached ticks count 1533 ticks from sheep with intensity of 8.4 and count 332 ticks from goats with intensity of 6.8. Tick species recovered from sheep and their incidence rates were: Rhipicephalus turanicus (39%), Hyalomma anatolicum (28%), R. (Boophilus) annulatus (11%), Hyalomma sp. (9%), H. turanicum (6%), H. excavatum (6%) and R. leporis (1%) while the tick species recovered from goats and their incidence rates were: R. turanicus (64%), H. anatolicum (24%)

... Show More
View Publication Preview PDF