The following dilution 5×10-1, 10-1, 10?2 , 10-3 gm/L for the indigenous isolate of Bacillus thuringiensis bacteria and the commercially isalate were used for experiments against the different stages of fig moth of E.cautella which exposed by filter paper method. The results showed that mortality of larval stages was increased with the increasing concentration of the biocide, in addition to increase in the mortality of the larval stages reached to the highest percentage in the third days of treatment of the larval stage in comparison with the first and second days of exposure. The results also showed that the sensitivity of larval stages was increased in first and second instars while reduced in the last instars .The high percentage of first instar mortality for the indigenous isolate in the concentration of 5×10-1 was 72.8% , while the low percentage of mortality showed in the concentration of 5×10-1 for the fifth instar larvae which was 13.3% in third days of treatment while a high percentage of mortality was showed for the first instar larvae for the commercially isulate in the concentration of 5×10-1 was 59.4% Furthermore, low percentage of mortality was shown in the concentration of 5×10-1 in fifth instar larval which was 8.3% in the third days of treatment. The results also showed that the indigenous isolated was more effective than the commercially produced bacteria for killing larval instars of fig moth E.cautella .The total percentage of larval instar mortality reached to 44.5 % after the third days of treatment in concentration 5×10-1 in the indigenous isolate , and it was 33.8 % in the commercially produced bacteria .
This study aimed to detect antibiotics in water, particulate, plant, and sediment in the Tigris River within Baghdad City, in addition to their spatiotemporal variations, and related physicochemical parameters. Five sites were selected in the river. Three target antibiotics (tetracycline, gentamycin, and ciprofloxacin) were detected in water, particulate, plant, and sediment of the river at all selected sites. The results clearly showed that the concentrations of target antibiotics were sediment > water > plant > particulate. Site 3 is considered as a risk site where high concentrations of all antibiotics during the wet and dry seasons wer
The contribution rate of tax revenues in the federal budget is very small compared to the rate of contribution of oil revenues and this leads to negative repercussions on the Iraqi economy and the budget becomes a prisoner of high and low oil prices, and this is a problem that needs to be studied to know the extent of the impact of economic and political decisions on the size of tax revenue and The research goal is determined in studying the effect of amending the Unified Law No (26) of 2019 on the size of annual tax revenues . &
... Show MoreThis study seeks to identify the possibility of achieving the property of faithful representation of accounting information and measure it by using the standard approach based on mathematical and statistical equations by comparing two financial periods before and after the application of (IFRS-15) Revenue from contracts with customers, during the period. (2014-2018), for the financial statements of the mixed joint stock companies listed on the Iraq Stock Exchange, which is one of the main pillars of the economic structure of the country, as a joint investment between the state and the private sector, and has importance in many aspects, including support for projects of public companies, S Absorption and employment of labor, as well as ra
... Show MoreBackground: Hypothyroidism is a decrease in the production of the thyroid hormones and leads to gland dysfunction. Ashwagandha extract was used as an ayurvedic treatment and supposed to be as antihypothyroidism agent.
Objectives: to investigate the impact of ashwagandha (Ash) extract on propylthiouracil (PTU)-induced hypothyroidism in rats.
Subjects and Methods: The rats were divided into three groups, control group, PTU (hypothyroid) group (6mg/kg/day by oral route), PTU (6mg/kg/day by oral route) +Ash (50mg/kg/day by oral route) treated group. All treatment continued for
... Show MoreThe urban Gentrification is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More