Preferred Language
Articles
/
bsj-7087
Taxonomic and morphological studies on the genus Chrotogonus Serville, 1838 (Pyrgomorphidae: Orthoptera) from Pakistan, with reference to their habitats
...Show More Authors

Species of genus Chrotogonus (surface grasshoppers) are phytophagous and damaging to various economical important plants in their seedling stages. In order to know the biodiversity of surface grasshoppers, the detailed study has been conducted from four provinces of Pakistan. During this study, biodiversity, taxonomy, diagnosis, morphometric analysis, habitat, global distribution, and remarks of each species have been described. Total of 826 specimens were collected and sorted out into three species and three subspecies: C. (Chrotogonus) homalodemus homalodemus (Blanchard, 1836), C. (Chrotogonus) homalodemus (Blanchard, 1836), C. (Chrotogonus) trachypterus trachypterus (Blanchard, 1836), C. (Chrotogonus) trachypterus robertsi Kirby, 1914, C. (Chrotogonus) trachypterus (Blanchard, 1836) and C. (Chrotogonus) turanicus Kuthy, 1905 based on newly constructed morphological keys and previous literature. The species C. (Chrotogonus) turanicus presented as a new record from Pakistan.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Research Journal Of Pharmacy And Technology
Bacteriological and molecular study on S. Aureus bacteria Atala, M.L.
...Show More Authors

Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Proceedings of Ninth International Congress on Information and Communication Technology
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
View Publication
Crossref
Publication Date
Tue Sep 01 2015
Journal Name
Iosr Journal Of Agriculture And Veterinary Science
Biological and physiological effects of Metarhizium anisopliae on Culex quinquefasciatus.
...Show More Authors

The results of studying the effects of M. anisopiliae spores on mosquito, C. quinquefasciatus showed a biological effects represented by immature mortality. The mortality increased proportionally with the concentrations of fungal spores, which reached (at high concentration 2×1011 spores / ml), to 86.6, 56.6% in first and late instar larvae, respectively. An important to mention that cumulative death rate was significantly associated with the time, which reached to 56% at 7 day after treatment. In addition, M. anisopiliae had a long period permanence in aquatic habitats; in which the residual effects stay 30 days in aquatic habitats after treatment at laboratory conditions. Interestingly, the long period exposure of fungal spores (30 minut

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Analysing Iraqi Railways Network by Applying Specific Criteria Using the GIS Techniques
...Show More Authors

The railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this st

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Stability Study of V(IV), Zr(IV), Rh(III), Pd(II), Cd(II) and Hg(II) Complexes with Pyrazol Derivative
...Show More Authors

In this work lactone (1) was prepared from the reaction of p-nitro phenyl hydrazine with ethylacetoacetate, which upon treatment with benzoyl chloride afforded the lactame (2). The reaction of (2) with 2-amino phenol produced a new Schiff base (L) in good yield. Complexes of V(IV), Zr(IV), Rh(III), Pd(II), Cd(II) and Hg(II) with the new Schiff base (L) have been prepared. The compounds (1, 2) were characterized by FT-IR and UV spectroscopy, as well as characterizing ligand (L) by the same techniques with elemental analysis (C.H.N) and (1H-NMR). The prepared complexes were identified and their structural geometries were suggested by using elemental analysis (C.H.N), flame atomic absorption technique, FT-IR and UV-Vis spectroscopy, in additio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Phytochemical profile, Antioxidant, Enzyme inhibitory and acute toxicity activity of Astragalus bruguieri
...Show More Authors

The medicinal plants (Astragalus species) have been used traditionally as anti-inflammatory, antioxidant, and Anti-diabetics. The current research investigates the phytochemistry and some biological activity of methanol extract of different parts of Astragalus bruguieri Bioss., a wild medicinal plant grows on Safeen mountain, Erbil, Iraq. The methanol extracts of A. bruguieri were analyzed for total phenolic, flavonoid, and saponin contents. In-vitro antioxidant activity was analyzed by 2,2-diphenyl-1-picrylhydrazyl (DPPH) and 2,2'-azino-bis (3-ethylbenzothiazoline-6-sulfonic acid) (ABTS) assays. Furthermore, the plant extracts were examined for in-vitro enzyme inhibitory activity and in-v

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Ghrelin and Obestatin Levels as a Novel Marker in Iraqi Obese Children
...Show More Authors

Obesity is an escalating health problem in developing countries. One to ten children worldwide are overweight in a report showed by the International Obesity Task Force. Ghrelin, orexigenic peptide, has 28 amino acids, it is considered the greatest remarkable promotion in the last two decades for understanding the physiological changes of action regu­lating food intake and hunger. Obestatin is a 23-amino acid peptide nearly connected to ghrelin that secures from substitutio

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Annals Of Parasitology
Evaluation the therapeutic efficacy of different concentration of amphotericin B drug in mice infected with visceral leishmaniosis
...Show More Authors

Liposomal amphotericin B (Amph B) has been used effectively to treat leishmaniosis, in spite of its high toxicity appeared in some patients. In our study, Amph B was administered in Leishmania donovani that infected BALB/c male mice using different concentrations to evaluate its efficacy challenge against infection as well as its effect in modulating immunity of the host. We observed that low doses with short duration of Amph B as a therapy regime significantly enhanced the induction of Th1 cytokine (INF-γ), but suppressed Th2 cytokine (IL-10) production. Groups of mice infected with L. donovani and treated with Amph B showed clearly increasing in INF-γ level and reduction in IL-10 level in concentration (3, 4, 5 mg/ml/kg) with best resul

... Show More
Scopus