The present work deals with five species of parasitic Hymenoptera belonging to Pteromalidae, Eupelmidae and Eurytornidae which have been reared from brachid beetles. A new species, Eurytoma irakensis is described and the species, Bruchocida orientalis Crawford is recorded for the first time from Iraq.
This paper deals with the mathematical method for extracting the Exponential Rayleighh distribution based on mixed between the cumulative distribution function of Exponential distribution and the cumulative distribution function of Rayleigh distribution using an application (maximum), as well as derived different statistical properties for distribution, and present a structure of a new distribution based on a modified weighted version of Azzalini’s (1985) named Modified Weighted Exponential Rayleigh distribution such that this new distribution is generalization of the distribution and provide some special models of the distribution, as well as derived different statistical properties for distribution
Two species of monogenetic trematodes of the genus Dactylogyrus were recorded in the present paper for the first time in Iraq from two freshwater fishes from Diyala river, Diyala province. The first species, D. bocageii Alvarez Pellitero, Vicente et Gonzalez Lanza, 1981 was recorded from gills of Aspius vorax, the second species, D. lenkorani Mikailov, 1967 was recorded from gills of Barbus sharpeyi. The descriptions and measurements of these parasites as well as their illustrations were given.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
A mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MoreA novel analytical method is developed for the determination of azithromycin. The method utilizes continuous flow injection analysis to enhance the chemiluminescence system of luminol, H2O2, and Cr(III). The method demonstrated a linear dynamic range of 0.001–100 mmol L-1 with a high correlation coefficient (r) of 0.9978, and 0.001–150 mmol L-1 with a correlation coefficient (r) of 0.9769 for the chemiluminescence emission versus azithromycin concentration. The limit of detection (L.O.D.) of the method was found to be 18.725 ng.50 µL−1 based on the stepwise dilution method for the lowest concentration within the linear dynamic range of the calibration graph. The relative standard deviation (R.S.D. %) for n = 6 was less than 1.2%
... Show More