The result revealed that the peak of population density of cabbage aphid Brevicoryne brassicae was 523.20 individuals/plant on 21 March in edges of rapeseed field and was 1141.67 individuals/plant in center of the field. Results revealed that population density of cabbage aphid in rapeseed fields surrounded by cover crops significantly were low compared with that of monoculture rapeseed. The location of rapeseed plants (in edges or in center) significantly affected (p<0.05) the tested pest density, e.g. optimum density was 146.69 individuals/plant in the center of the field. Whereas was 93.32 in the edges. Effect of the interaction between location and surrounding vegetation was significant on aphid density, which their population density reached the maximum level, i.e. 325.4 individuals/ plant in the center of monoculture rapeseed field, Whereas minimum density was recorded, i.e. 46.74 individuals/plant in the rapeseed surrounded by clover. In regard to the population density of parasitoid Diaeretiella rapae, results showed that its density reached 1.70 mummies/ plant in the edges of rapeseed surrounded by onion. This treatment considerably exceeded the rapeseed surrounded by clover and monoculture rapeseed in which parasitoid density counted 0.45&0.60 mummies/ plant respectively. Population density of coccinellids ranged between 0.18 & 0.42 individuals/ plant for the edges or center of the fields of the treatments, without considerable differences between them..
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreIn The Name of Allah Most Gracious Most Merciful
The reason for choosing this topic was:
First: It is my great love for the Prophet Muhammad, may God’s prayers and peace be upon him, his family, his companions, his followers, the followers of their followers, and the scholars after them until the Day of Judgment.
Secondly: Showing a great jurisprudential figure who has contributed by speaking about important jurisprudential issues in the life of this nation, and bringing out this immortal book to put it in the hands of scholars, so I chose a figure from the followers (may God be pleased with them all).
Third: The study of the jurisprudence of the companions
The concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCrude-colicin was extracted from g.coli isolated from urinary tract
infection patients. Toxicity of various concentrations of crudt: colicin
on the viability of immune cells [phagocytic ceUs(M0,PMN) and lymphocytes] was studied. Results indicated that toxicity ciTect of crude colicin is dependent on concentration. Low concentrations (I0,
25, 50 mg/ml) didn't have toxic effects, but when there was an increase in the consternation of this extract, the viability of the immune cell s began to decrease.
This experiment was carried out at the Field of Poultry, Department of Animal Resources, College of Agriculture, University of Baghdad, during the period from 1/5/2011 until 5/7/2011 to study the effect of adding arginine to laying hens diet on certain blood traits. A total of 100 Brown Lohmann laying hen chickens, 38 weeks of age, were randomly distributed into four treatment groups, with 25 hens for each treatment. Treatment groups were: T1: bird-fed diet with no additional arginine (control group); T2, T3, and T4: bird-fed diet supplemented with 0.4, 0.7, and 0.9%, respectively. Therefore, the total amounts of arginine in the four treatments (T1, T2, T3, and T4) become 1.1, 1.5, 1.8, and 2.0%, respectively. Results of this experiment rev
... Show MoreComplexes of Au (III), Pd (II), Pt (IV ) and Rh(III) with S–propynyle-2- thiobenzimidazole (BENZA) have been prepared and characterized by IR and UV- Visible spectral methods in addition to magnetic and conductivity measurements and micro–elemental analysis (CHN).The probable structures of the new complexes have been suggested.
The organizations, represented by its Management, are working hard in various ways to identify the environmental disturbances that occur in their environment and to investigate and follow up the movement of these disturbances and to respond to them through the decisions they make in an attempt to keep pace with the work and sustainability of their activities, including those decisions, marketing decisions taken by the environmental disturbulence in the market of the organization, the inability of these organizations to read the indicators of these disturbulence correctly displays their marketing effectiveness to vibration and decline in the negative.The current research is based on a fundamental problem that envi
... Show More