Preferred Language
Articles
/
bsj-2515
Evaluation the efficiency of different techniques for extraction and purification of Tomato yellow leaf curl virus (TYLCV)
...Show More Authors

This study was conducted to evaluate the efficacy of different techniques for extraction and purification of Tomato yellow leaf curl virus (TYLCV). An isolate of the virus free of possible contamination with other viruses infecting the same host and transmitted by the same vector Bemisia tabaci Genn. was obtained. This was realized by indicator plants and incubation period in the vector. Results obtained revealed that the virus infect Nicotiana glutinosa without visible symptoms, while Nicotiana tabaccum var. White Burley was not susceptible to the virus. The incubation period of the virus in the vector was found to be 21 hrs. These results indicate that the virus is TYLCV. Results showed that Butanol was more effective in clarification the sap and eliminate of plant proteins and chlorophyll. The use of citrate buffer at pH 8 amended with reducing agents and EDTA to prevent the oxidation of phenolic compound was found to be suitable in maintaining the biological activity of the virus during extraction. The quantity of the virus obtained was 3.05 mg/100 gm leaves with absorption ratio of 1.4 at 260/280 nm which represent standard value for TYLCV.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Application Artificial Forecasting Techniques in Cost Management (review)
...Show More Authors

For the duration of the last few many years many improvement in computer technology, software program programming and application production had been followed with the aid of diverse engineering disciplines. Those trends are on the whole focusing on synthetic intelligence strategies. Therefore, a number of definitions are supplied, which recognition at the concept of artificial intelligence from exclusive viewpoints. This paper shows current applications of artificial intelligence (AI) that facilitate cost management in civil engineering tasks. An evaluation of the artificial intelligence in its precise partial branches is supplied. These branches or strategies contributed to the creation of a sizable group of fashions s

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 12 2021
Journal Name
Engineering, Technology And Applied Science Research
Automated Pavement Distress Detection Using Image Processing Techniques
...Show More Authors

Pavement crack and pothole identification are important tasks in transportation maintenance and road safety. This study offers a novel technique for automatic asphalt pavement crack and pothole detection which is based on image processing. Different types of cracks (transverse, longitudinal, alligator-type, and potholes) can be identified with such techniques. The goal of this research is to evaluate road surface damage by extracting cracks and potholes, categorizing them from images and videos, and comparing the manual and the automated methods. The proposed method was tested on 50 images. The results obtained from image processing showed that the proposed method can detect cracks and potholes and identify their severity levels wit

... Show More
Scopus (27)
Crossref (23)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Al-khwarizmi Engineering Journal
Defect Detection Using Thermography Camera Techniques: A review
...Show More Authors

Individuals across different industries, including but not limited to agriculture, drones, pharmaceuticals and manufacturing, are increasingly using thermal cameras to achieve various safety and security goals. This widespread adoption is made possible by advancements in thermal imaging sensor technology. The current literature provides an in-depth exploration of thermography camera applications for detecting faults in sectors such as fire protection, manufacturing, aerospace, automotive, non-destructive testing and structural material industries. The current discussion builds on previous studies, emphasising the effectiveness of thermography cameras in distinguishing undetectable defects by the human eye. Various methods for defect

... Show More
View Publication
Crossref
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation the effect of burning investment and black sand materials on the surface roughness of acrylic resin denture base
...Show More Authors

Objective: The aim of this study was to evaluate the effect of pumice, burning investment material
and black sand on the surface roughness of heat cure acrylic resin.
Methodology: Sixty specimens were prepared from pink heat cure acrylic resin, the specimens
where grouped into; 20 specimens which polished with pumice and water (control group); 20
specimens which polished with investment material (after burning it) and water; and 20 specimens
which polished with black sand and water. The average surface roughness of specimens after
polishing procedure had been determined by profilometer (surface roughness tester).
Results: Through the application of ANOVA and LSD tests, the result of this study showed that there
wa

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Study the Ability of Pseudomonas Aeruginosa Isolated from Different Clinical Cases to Biofilm Formation and Detection of Algd Gene.
...Show More Authors

98 samples were collected from various clinical sources included (Burns, wounds, urines, sputums, blood) From the city of Baghdad, After performing the biochemical and microscopic examination, 52 isolates were obtained for Pseudomonas aeruginosa, 17 (32.7%) isolates from burn infection, 12 (23%) isolates from Wound infection 11 (21.2%) isolates from urine infection, 7 (13.5%) isolates of sputum and 5 (9.6%) isolates from blood. Bacteria susceptibility to form biofilm has been detectedby microtiter plate method, The results showed that 80% of the bacterial isolates were produced the biofilm with different proportions, alg D gene (alginate production) has been detected by polymerase chain reaction (PCR) Which plays an essential role in the fo

... Show More
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The importance of drafting Arab accounting standards Comparative study in light of international accounting compliance and different environmental factors
...Show More Authors

Importance of accounting standards belong to be the instructor and the advisor for accountant in performing his work . For each invironment a group of political, social, economical  and cultural factors which distinguish it about other environments . In  order to perform its aim in produsing accouting information helps in making decisions on different levels, accounting standards should established in a form that harmonized with the environment that apply in it . Establishing international accounting standards comes with the same direction and then it has put influential with standards some states that have influence on international accounting standards committee. So because of the big changes that happened in the inte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Iraqi Geological Journal
Advanced Geostatistical Techniques for Building 3D Geological Modeling: A Case Study from Cretaceous Reservoir in Bai Hassan Oil Field
...Show More Authors

A 3D Geological model was generated using an advanced geostatistical method for the Cretaceous reservoir in the Bai Hassan oil field. In this study, a 3D geological model was built based on data from four wells for the petrophysical property distribution of permeability, porosity, water saturation, and NTG by using Petrel 2021 software. The geological model was divided into a structural model and a property model. The geological structures of the cretaceous reservoir in the Bai Hassan oil field represent elongated anticline folds with two faults, which had been clarified in the 3D Structural model. Thirteen formations represent the Cretaceous reservoir which includes (Shiranish, Mashurah, U.kometan, Kometan Shale, L. Kometan, Gulnen

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Dec 02 2013
Journal Name
International Journal Of Pharmacy And Pharmaceutical Sciences
Formulation and in vitro evaluation of rosuvastatin calcium niosomes
...Show More Authors

Scopus (28)
Scopus
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Evaluation Method of Mesh Protocol over ESP32 and ESP8266
...Show More Authors

Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (8)
Scopus Clarivate Crossref