Preferred Language
Articles
/
bsj-2893
Influence of the Surrounding Plants by Rapeseed Field on Population Density of Cabbage Aphid (Brevicoryne brassicae L.) and its Biological Enemies
...Show More Authors

The result revealed that the peak of population density of cabbage aphid Brevicoryne brassicae was 523.20 individuals/plant on 21 March in edges of rapeseed field and was 1141.67 individuals/plant in center of the field. Results revealed that population density of cabbage aphid in rapeseed fields surrounded by cover crops significantly were low compared with that of monoculture rapeseed. The location of rapeseed plants (in edges or in center) significantly affected (p<0.05) the tested pest density, e.g. optimum density was 146.69 individuals/plant in the center of the field. Whereas was 93.32 in the edges. Effect of the interaction between location and surrounding vegetation was significant on aphid density, which their population density reached the maximum level, i.e. 325.4 individuals/ plant in the center of monoculture rapeseed field, Whereas minimum density was recorded, i.e. 46.74 individuals/plant in the rapeseed surrounded by clover. In regard to the population density of parasitoid Diaeretiella rapae, results showed that its density reached 1.70 mummies/ plant in the edges of rapeseed surrounded by onion. This treatment considerably exceeded the rapeseed surrounded by clover and monoculture rapeseed in which parasitoid density counted 0.45&0.60 mummies/ plant respectively. Population density of coccinellids ranged between 0.18 & 0.42 individuals/ plant for the edges or center of the fields of the treatments, without considerable differences between them..

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Thu Jun 29 2017
Journal Name
College Of Islamic Sciences
Imam Yahya bin Saeed Al-Ansari and his jurisprudential views on fasting issues
...Show More Authors

In The Name of Allah Most Gracious Most Merciful

 

The reason for choosing this topic was:

 

First: It is my great love for the Prophet Muhammad, may God’s prayers and peace be upon him, his family, his companions, his followers, the followers of their followers, and the scholars after them until the Day of Judgment.

 


Secondly: Showing a great jurisprudential figure who has contributed by speaking about important jurisprudential issues in the life of this nation, and bringing out this immortal book to put it in the hands of scholars, so I chose a figure from the followers (may God be pleased with them all).

 


Third: The study of the jurisprudence of the companions

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
On Fully Stable Banach Algebra Modules and Fully Pesudo Stable Banach Algebra Modules
...Show More Authors

The concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study of Toxic Effect of Crud Colicin Exracted from Escherchia Coli on Viability of Immune Cells.
...Show More Authors

Crude-colicin  was extracted from g.coli isolated from urinary tract

infection patients. Toxicity of various concentrations of crudt: colicin

on the viability of immune cells [phagocytic ceUs(M0,PMN) and lymphocytes]  was studied.  Results  indicated  that  toxicity  ciTect of crude colicin is dependent on concentration. Low concentrations (I0,

25, 50  mg/ml)  didn't  have  toxic  effects,  but  when  there  was an increase  in  the  consternation  of  this  extract, the    viability  of  the immune cell s began to decrease.

View Publication Preview PDF
Publication Date
Mon Aug 15 2011
Journal Name
International Journal Of Poultry Science
Effect of Dietary Supplementation with Different Levels of Arginine on Some Blood Traits of Laying Hens
...Show More Authors

This experiment was carried out at the Field of Poultry, Department of Animal Resources, College of Agriculture, University of Baghdad, during the period from 1/5/2011 until 5/7/2011 to study the effect of adding arginine to laying hens diet on certain blood traits. A total of 100 Brown Lohmann laying hen chickens, 38 weeks of age, were randomly distributed into four treatment groups, with 25 hens for each treatment. Treatment groups were: T1: bird-fed diet with no additional arginine (control group); T2, T3, and T4: bird-fed diet supplemented with 0.4, 0.7, and 0.9%, respectively. Therefore, the total amounts of arginine in the four treatments (T1, T2, T3, and T4) become 1.1, 1.5, 1.8, and 2.0%, respectively. Results of this experiment rev

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Sat Mar 31 2007
Journal Name
Um-salama Science Journal
Synthesis and Characterization of the Heavy Metals; Au(III), Pd(II), Pt(IV) and Rh(III) Complexes of S-Propynyl 2-Thiobenzimidazole
...Show More Authors

Complexes of Au (III), Pd (II), Pt (IV ) and Rh(III) with S–propynyle-2- thiobenzimidazole (BENZA) have been prepared and characterized by IR and UV- Visible spectral methods in addition to magnetic and conductivity measurements and micro–elemental analysis (CHN).The probable structures of the new complexes have been suggested.

Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Comparative study between the individual, dual and triple addition of (SF), (TGP) and (PVA) for improving Local Plaster of Paris (LPOP) properties
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Marketing decisions as an intermediary variable of the nature of the relationship between Environmental Turbulence and marketing effectiveness exploratory study of Carrefour branches in Erbil Governorate
...Show More Authors

The organizations, represented by its Management, are working hard in various ways to identify the environmental disturbances that occur in their environment and to investigate and follow up the movement of these disturbances and to respond to them through the decisions they make in an attempt to keep pace with the work and sustainability of their activities, including those decisions, marketing decisions taken by the environmental disturbulence in the market of the organization, the inability of these organizations to read the indicators of these disturbulence correctly displays their marketing effectiveness to vibration and decline in the negative.The current research is based on a fundamental problem that envi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref