Preferred Language
Articles
/
bsj-2713
The interference between effects of Adhatoda vasica (Nees) extracts and Bacillus thuringiensis (Berliner) for controlling population of fig moth, Ephestia cautella Walker
...Show More Authors

The activity of Adhatoda vasica crude plants extracts against B.thuringiensis bacteria was determined by MIC test and sensitivity test which showed no response of this type of bacteria against extracts .The interference between the effect of hot and cold aqueous extracts and Bacillus thuringiensis bacteria for controlling the population of fig moth when males and females released before treatment under control condithion was gave a highly percentage of larval mortality which reached to 100% in (B.t. + hot aqueous extract ) and 97.3% in (B.t + coldaqueous extract ) after two weeks of treatment when concentration of 50% of aqueous extracts and 5×10?1of Bacillus thuringiensis bacteria but when the insect (males & females) released after the dates treated with B.t & hot aqueous extract , the mortality was 100% in all first instar larvae. The results also showed that when treatment of the dates before the insects released more influence than that treated the date after the insects released so the percentage of mortality of larvae reached to 100% in first method and to 86.0% in second methods .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
The provisions of taking the mother's fare breastfeeding comparative jurisprudential study
...Show More Authors

This study aimed to clarify the provisions of taking the mother for breastfeeding in Islamic jurisprudence, a comparative study between doctrines of jurisprudence. The ruling on forcing the mother to breastfeed, and the ruling on taking the mother for breastfeeding while she is in the infallibility of her husband, as well as in several reactionary divorces, and the ruling on breastfeeding in several divorced divorces. On breastfeeding in infallibility Face, as well as a several divorce reactionary, and worth the fare which is in several final divorces, and after the end of the marital relationship, has been proposed a number of recommendations, including it, is recommended to teach the provisions of the mother taking the taxi on breastfe

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 14 2022
Journal Name
Plos One
The passage of time in Iraq during the covid-19 pandemic
...Show More Authors

The covid-19 global pandemic has influenced the day-to-day lives of people across the world. One consequence of this has been significant distortion to the subjective speed at which people feel like time is passing. To date, temporal distortions during covid-19 have mainly been studied in Europe. The current study therefore sought to explore experiences of the passage of time in Iraq. An online questionnaire was used to explore the passage of time during the day, week and the 11 months since the first period of covid-19 restrictions were imposed in Iraq. The questionnaire also measured affective and demographic factors, and task-load. The results showed that distortions to the passage of time were widespread in Iraq. Participants co

... Show More
View Publication
Scopus (16)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Thu Dec 28 2023
Journal Name
مجلة الجامعة العراقية
The emergence of the Vietnamese National Movement in China 1921-1946
...Show More Authors

The research, which was drawn from his doctoral thesis (People's Policy towards Vietnam 1949-1979), discussed the roots of the connections between the Chinese and Vietnamese communists since the 1920s, the presence of Ho Chi Minh and other Vietnamese communists in China, their influence by the revolutionary struggle of the Chinese Communist Party and their establishment of a group of The Vietnamese Revolutionary Societies and the Indo-Chinese Communist Party until the outbreak of the Vietnamese Revolution and their success in declaring the establishment of the Democratic Republic of Vietnam in 1946. Keywords: Ho Chi Minh, Chinese Communist Party, Indo-Chinese Communist Party, Democratic Republic of Vietnam, Chou En Lai.

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
دراسات قانونية
The Legal Nature of the Build-Operate- transfer-Ownership Contract (B.O.T.)
...Show More Authors

The legal nature of the Build-Operate-Transfer-Ownership Contract (B.O.T) The Build, Operate, and Transfer of Ownership Contract (BOT) has emerged as the most successful and safest method for involving the private sector in public sector services. The major infrastructure projects that are built through the BOT contract are no longer financed by the state and its budget, but the private sector has played a major role in financing These projects, especially developing countries that need to establish infrastructure or modernize their existing infrastructure, especially in the areas of transport, communications, services, electricity, water ..... and other public utilities.

Publication Date
Tue May 30 2006
Journal Name
Baghdad University
Unpublished Cuneiform Texts From The Reign Of The King Ammi Şaduqa
...Show More Authors

The cuneiform texts considered one of the most important resources which play an important role help us to know how was the economic , politic and religious manner and every thing have relation of the history of Mesopotamia which contain many of information that enrich our knowldgement every side of Mesopotamia civilization since using writing as away to register the science and human knowldgement . The city of Sippar (Abu –Habba ) was one of most important city of ancient Mesopotamia which mentioned as one of first five Mesopotamian cities found before floating and it exposed through excavating rich one of them tablet which some of it dated to old Babylon period . The king Ammi-Saduqa has a big share of tablet we study number of thi

... Show More
Publication Date
Fri Apr 01 2016
Journal Name
Astronomy Reports
Ionized gas in the circumgalactic vicinity of the M81 galaxy group
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Computing And Digital Systems
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the method of parsing anomalous valueIn estimating the character parameter
...Show More Authors

In this paper the method of singular value decomposition  is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The aesthetic effect of vocal recitation in building the theatrical image
...Show More Authors

Between the duality of sound and image, the completeness of the actor’s personality at the director comes to announce the birth of the appropriate theatrical role for that character as the basic and inherent element of the artwork, within his working system in the pattern of vocal behavior as well as motor/signal behavior as he searches for aesthetic and skill proficiency at the same time.
This is done through the viewer’s relationship with the theatrical event, which the director considers as an area of active creative activity in relation to (the work of the actor) through vocal recitation and the signs it broadcasts in order to fulfill the requirements of the dramatic situation and what it requires of a visual vision drawn in t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 30 2013
Journal Name
International Journal Of Network Security & Its Applications
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding

... Show More
View Publication Preview PDF
Crossref