This study was conducted to determine the fungal cause and bio control of damping off and root rot of wheat plants by using pseudomonas fluorescens under greenhouse and field conditions. Results showed isolation of eight species from the soil and roots to deferent region of Baghdad government. Rhizoctonia solani (Rs) and Fusarium solani (Fs) were the predominant damping off fungus with frequency 60 and 52% respectively. Led the using of bacteria formulations such as crud suspension , pure bacteria filtration and pure living cells in culture medium inhibit all type fungi with rates ranging from 84-96% , 80- 93% and 75-88% respectively. Rs and Fs were more pathogenesis under greenhouse conditions, with incidence of 80 and 68% and disease severity up to 41,20 and 30,20% respectively. The results of test bacterial formulation (dry, liquid and bacterial filtrate ) with seeds, soil and water irrigation showed high effectiveness for all treatments with superiority of the treatment of seeds in reducing the incidence which reached for the three formulation 21-34% compared with the infested control of Fs, Rs which reached 70 and 55%, respectively. Field experiments results showed superiority of seeds bacterization with dry formulation to reduce the disease incidence to 38% compared with the infested control (75%).These results reflected on the increasing of the shoot and rot dry weight and increasing the productivity (63%) compared with the infested control treatment .
This study was conducted to detect C.sakazakii PIF and raw milk. Two hundred samples of PIF were taken from the infected hospital infants who used this type of milk and from the local markets in addition to 16 sample of raw milk were collected. The study is the first to report the isolation of C. sakazakii and Enterobacter spp. from raw milk in Iraq. The distribution of C.sakazakii and Enterobacter spp. among the presumptive isolates using Vitek-GN2 system gave 1/16(6.25%) isolates of C.sakazakii and 4/16 (25%) isolates of Enterobacter spp. Enterobacter spp. isolates include (E.cloacae ssp. cloacae and E.cloacae ssp. dissolvens, E.hormaechei, and E.ludwigii) that isolate from raw milk Differences in between percentages of each isolate perse
... Show MoreThe research aims to identify the positives formulation entrances authors depending on the setting retaining the names of the authors of Arab veterans and cons of setting the entrances to Arab authors ancient depending on the nickname by desktop diligence without reference to a setting retaining the potential to benefit other libraries disciple of retaining existing in sober university libraries. Use the survey method and adopted a questionnaire distributed to the research sample consisting of employees working in the libraries in question and the total number of forms that have been distributed (50) form .tousel search phrase conclusions from them .
1-The lack of authority control depends on it to find a
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreFinding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show More