Phytophagous stink bugs (Hemiptera, Pentatomidae) are economically important insect pests of fruit, vegetable, nut and field crops. This study was carried out during the season of 2013 in orchards within Erbil city, to follow the stink bug Mustha spinulosa (Lefebvre, 1831) seasonal fluctuation on some fruit trees: olive, plum, apricot, pear, apple and almond.
The stink bug reaches its maximum abundance throughout the second week of August (38.2/tree) coinciding with mean temperature and relative humidity of 33.40C and 28.14% respectively, and the highest total mean of the number of the insect was recorded on the olive trees (181.8/tree). The study reveals that the stink bug attacked 22 trees (fruit and forest) while it has not attack any herbal plant.
The current research aims to build a training program for chemistry teachers based on the knowledge economy and its impact on the productive thinking of their students. To achieve the objectives of the research, the following hypothesis was formulated:
There is no statistically significant difference at (0.05) level of significance between the average grades of the students participating in the training program according to the knowledge economy and the average grades of the students who did not participate in the training program in the test of productive thinking. The study sample consisted of (288) second intermediate grade students divided into (152) for the control group
... Show MoreBreast cancer has got much attention in the recent years as it is a one of the complex diseases that can threaten people lives. It can be determined from the levels of secreted proteins in the blood. In this project, we developed a method of finding a threshold to classify the probability of being affected by it in a population based on the levels of the related proteins in relatively small case-control samples. We applied our method to simulated and real data. The results showed that the method we used was accurate in estimating the probability of being diseased in both simulation and real data. Moreover, we were able to calculate the sensitivity and specificity under the null hypothesis of our research question of being diseased o
... Show MoreBackground. Endodontic infections caused by remaining biofilm following disinfection with chemical fluids encourage secondary bacterial infection; hence, employing laser pulses to activate the fluids is advised to improve microbial biofilm clearance. This study investigated the performance of Er,Cr:YSGG laser in photon-induced photoacoustic streaming (PIPS) agitation of 5.25% sodium hypochlorite (NaOCl) to enhance the removal of mature Enterococcus faecalis (E. faecalis) biofilms in complex root canal systems. Methods. The mesial roots of the lower first and second molars were separated and inoculated with E. faecalis bacteria for 30 days. The roots were irrigated with 5.25% NaOCl, some of them were agitated with passive ultrasonic
... Show MorePurpose: As a result of the sudden and ill-considered trade openness of Iraq after 2003 to the countries of the world in general and the neighboring countries in particular, and in the absence of the necessary support for the national productive forces and the lack of effective standardization and quality control devices, this led to the exposure of most local products, especially agricultural ones, to decline and inability On the competition and thus dumping the Iraqi market, especially the agricultural products, with imported products, this study came to find out the effect that dumping has on the local production of chicken meat and the impact of that impact on the size of the food gap, and whether the results of the practica
... Show MoreThe study aims to investigate the degree of student teachers at Sultan Qaboos University acquired skills in teaching Arabic via a virtual micro-teaching lab, as well as to reveal the difficulties they faced and their development proposals. To do this, the researchers developed a questionnaire divided into four dimensions: planning, implementation, evaluation, and
ethical values for the teaching profession, in addition to two open-ended questions to identify difficulties and suggestions. It was administered to (30) student teachers. The results revealed that the average degree of student-teacher acquisition of skills was high in its four dimensions. It ranged between (39.2) to (82.2), while the overall average was (56.2).
... Show MoreThe monetary policy is a vital method used in implementing monetary stability through: the management of income and adjustment of the price (monetary targets) in order to promote stability and growth of real output (non-cash goals); the tool of interest rate and direct investment guides or movement towards the desired destination; and supervisory instruments of monetary policy in both quantitative and qualitative. The latter is very important as a standard compass to investigate the purposes of the movement monetary policy in the economy. The public and businesses were given monetary policy signals by those tools. In fiscal policy, there are specific techniques to follow to do the spending and collection of revenue. This is done in order to
... Show MoreThe fundamental problem in determining the role of television programs in broadcasting the culture of community for peace through studying almosamig kareem program by studying the topics addressed in this program. It is a descriptive study and it follows the approach survey method. In this study, the spatial framework is limited to the program of almosamih kareem on YouTube, while the temporal framework is concerned with the episodes that are raised on YouTube from the second half of 2014 to 2015 of almosamih kareem program. The fundamental problem in determining the role of television programs in broadcasting the culture of community for peace through studying almosamig kareem program by studying the topics addressed in this
... Show MoreIn this paper, compared eight methods for generating the initial value and the impact of these methods to estimate the parameter of a autoregressive model, as was the use of three of the most popular methods to estimate the model and the most commonly used by researchers MLL method, Barg method and the least squares method and that using the method of simulation model first order autoregressive through the design of a number of simulation experiments and the different sizes of the samples.
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More