This study was conducted to determine the fungal cause and bio control of damping off and root rot of wheat plants by using pseudomonas fluorescens under greenhouse and field conditions. Results showed isolation of eight species from the soil and roots to deferent region of Baghdad government. Rhizoctonia solani (Rs) and Fusarium solani (Fs) were the predominant damping off fungus with frequency 60 and 52% respectively. Led the using of bacteria formulations such as crud suspension , pure bacteria filtration and pure living cells in culture medium inhibit all type fungi with rates ranging from 84-96% , 80- 93% and 75-88% respectively. Rs and Fs were more pathogenesis under greenhouse conditions, with incidence of 80 and 68% and disease severity up to 41,20 and 30,20% respectively. The results of test bacterial formulation (dry, liquid and bacterial filtrate ) with seeds, soil and water irrigation showed high effectiveness for all treatments with superiority of the treatment of seeds in reducing the incidence which reached for the three formulation 21-34% compared with the infested control of Fs, Rs which reached 70 and 55%, respectively. Field experiments results showed superiority of seeds bacterization with dry formulation to reduce the disease incidence to 38% compared with the infested control (75%).These results reflected on the increasing of the shoot and rot dry weight and increasing the productivity (63%) compared with the infested control treatment .
In this work, animal bones with different shapes and sizes were used to study the characteristics of the ground penetrating Radar system wares reflected by these bones. These bones were buried underground in different depths and surrounding media. The resulting data showed that the detection of buried bones with the GPR technology is highly dependent upon the surrounding media that the bones were buried in. Humidity is the main source of signal loss in such application because humidity results in low signal-to-noise ratio which leads to inability to distinguish between the signal reflected by bones from that reflected by the dopes in the media such as rock .
This study detects the presence of cholesterol in an Iraqi plant named Suaeda baccata Forsk of the family Chenopodiacae, wildly and widely grown in Iraq. The absence of any publication concerning the sterol content of this Suaeda specie, and the industrial importance of cholesterol depending on its role as a precursor in the synthesis of some hormones, like progesterone, acquired this study its value. The investigations revealed the presence of cholesterol that was proved by TLC together with the standard compound cholesterol, and anisaldehyde spray reagent using three different solvent systems, then authenticated by HPLC, in which the reten
... Show MoreCeliac disease (CD) is an autoimmune disorder characterized by chronic inflammation that essentially affects the small intestine and is caused by eating gluten-containing foods. This study sought to determine gene expression of NLRP3 Inflammasome in peripheral blood of Iraqi CD children using quantitative real-time PCR (qRT-PCR) assay. Thirty children with CD (12 males and 18 females) were enrolled in the study and their age range was 3-15 years. The diagnosis of the disease was confirmed by serological examinations and intestinal endoscopy. A control sample of 20 age-matched healthy children was also included. The children were stratified for age, gender, body max index (BMI), histological findings, and marsh classification. Fu
... Show MoreCeliac disease (CD) is an autoimmune disorder characterized by chronic inflammation that essentially affects the small intestine and is caused by eating gluten-containing foods. This study sought to determine gene expression of NLRP3 Inflammasome in peripheral blood of Iraqi CD children using quantitative real-time PCR (qRT-PCR) assay. Thirty children with CD (12 males and 18 females) were enrolled in the study and their age range was 3-15 years. The diagnosis of the disease was confirmed by serological examinations and intestinal endoscopy. A control sample of 20 age-matched healthy children was also included. The children were stratified for age, gender, body max index (BMI), histological findings, and marsh classification. Furthe
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreThis article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreEye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera
... Show More