Preferred Language
Articles
/
bsj-2713
The interference between effects of Adhatoda vasica (Nees) extracts and Bacillus thuringiensis (Berliner) for controlling population of fig moth, Ephestia cautella Walker
...Show More Authors

The activity of Adhatoda vasica crude plants extracts against B.thuringiensis bacteria was determined by MIC test and sensitivity test which showed no response of this type of bacteria against extracts .The interference between the effect of hot and cold aqueous extracts and Bacillus thuringiensis bacteria for controlling the population of fig moth when males and females released before treatment under control condithion was gave a highly percentage of larval mortality which reached to 100% in (B.t. + hot aqueous extract ) and 97.3% in (B.t + coldaqueous extract ) after two weeks of treatment when concentration of 50% of aqueous extracts and 5×10?1of Bacillus thuringiensis bacteria but when the insect (males & females) released after the dates treated with B.t & hot aqueous extract , the mortality was 100% in all first instar larvae. The results also showed that when treatment of the dates before the insects released more influence than that treated the date after the insects released so the percentage of mortality of larvae reached to 100% in first method and to 86.0% in second methods .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 24 2023
Journal Name
Environmental Monitoring And Assessment
Rice husk coated with copper oxide nanoparticles for 17α-ethinylestradiol removal from an aqueous solution: adsorption mechanisms and kinetics
...Show More Authors

The 17 α-ethinylestradiol (EE2) adsorption from aqueous solution was examined using a novel adsorbent made from rice husk powder coated with CuO nanoparticles (CRH). Advanced analyses of FTIR, XRD, SEM, and EDSwere used to identify the classification parameters of a CRH-like surface morphology, configuration, and functional groups. The rice husk was coated with CuO nanoparticles, allowing it to create large surface area materials with significantly improved textural qualities with regard to functional use and adsorption performance, according to a detailed characterization of the synthesized materials. The adsorption process was applied successfully with elimination effectiveness of 100% which can be kept up to 61.3%. The parameters of ads

... Show More
View Publication
Scopus (11)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Mar 30 2013
Journal Name
College Of Islamic Sciences
 The responses of the army overseer to the grammarians in the preposition section
...Show More Authors

This is a contextual study in face and isotope science, and I have made it in one of the terms faces and isotopes, which is the word (bad). Quranic also, and that is at every aspect they mentioned.
The nature of the research required that it be divided into three sections:
The first topic: I singled it out to show the types of contextual connotations.
- The second topic: I singled it out to define the word bad and its meaning.
- The third topic: I devoted it to the study of the word bad and explaining the significance of the Quranic context on the additional meaning and the original meaning.
Conclusion: It mentioned the most important results, which are:
1- The significance of the Quranic context is one of the most impo

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 27 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Extent of auditors' commitment to the quality control system according to the Iraqi Audit guide / 7 : A field study of a sample of auditors of the second district audit office In the The Federal Financial Supervision Board
...Show More Authors

The research aims to achieve a set of objectives, the most important of which is determining the extent to which the auditors of the research sample in the Federal Bureau of Financial Supervision adhere to the requirements of the quality control system according to the Iraqi Audit Manual No. The federal financial / research sample with the quality control system according to the Iraqi audit guide No. 7), and the researcher seeks to test the main research hypothesis and sub-hypotheses, and to achieve this, a questionnaire was designed by (Google Form) and distributed electronically to the elements of the research sample, Through the statistical package program (SPSS), the results of the questionnaire were analysed. In light of the applied

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Fuzzy Robust Estimation For Location Parameter
...Show More Authors

 In this paper, we introduce three robust fuzzy estimators of a location parameter based on Buckley’s approach, in the presence of outliers. These estimates were compared using the variance of fuzzy numbers criterion, all these estimates were best of Buckley’s estimate. of these, the fuzzy median was the best in the case of small and medium sample size, and in large sample size, the fuzzy trimmed mean was the best.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
Wavelet compression for remotely sensed images
...Show More Authors

Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.

View Publication Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Construction Bullying scale for Kindergarten child
...Show More Authors

Construction of photographed bullying scale of kindergarteners was the aim of this study. The study conducted to answer the raised question, could the bullying among kindergarteners be measured?. A total of (200) boy and girl were selected from city of Baghdad to be the sample of the study. The scale composed of (27) item with colored pictures. It takes about (15) minuets to answer the whole scale items. SPSS tools were used to process the collected data. The result showed that the bullying among kindergarteners could be measured.

View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Human Computer Interface for Wheelchair Movement
...Show More Authors

This paper aims to develop a technique for helping disabled people elderly with physical disability, such as those who are unable to move hands and cannot speak howover, by using a computer vision; real time video and interaction between human and computer where these combinations provide a promising solution to assist the disabled people. The main objective of the work is to design a project as a wheelchair which contains two wheel drives. This project is based on real time video for detecting and tracking human face. The proposed design is multi speed based on pulse width modulation(PWM), technique. This project is a fast response to detect and track face direction with four operations movement (left, right, forward and stop). These opera

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref