Preferred Language
Articles
/
jnhm-87
A NEW HOST RECORD FOR TOMATO LEAF MINER TUTA ABSOLUTA (MEYRICK, 1917) IN BAGHDAD PROVINCE, IRAQ
...Show More Authors

  In 2010, the tomato leaf miner Tuta absoluta (Meyrick, 1917) was reported for the first time in Iraq. The larvae can feed on all parts of tomato plants and can damage all the growth stages. The main host plant is tomato, Lycopersicon esculentum, but it can also attack other plants in Solanaceae family. In this study it was found attacking alfalfa plants, Medicago sativa in Baghdad Province. This finding reveals that alfalfa also serves as a host plant for T. absoluta in Iraq.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
A Signal Amplification-based Transceiver for Visible Light Communication
...Show More Authors

Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Mar 09 2017
Journal Name
Sensors
A Multimodality Hybrid Gamma-Optical Camera for Intraoperative Imaging
...Show More Authors

The development of low profile gamma-ray detectors has encouraged the production of small field of view (SFOV) hand-held imaging devices for use at the patient bedside and in operating theatres. Early development of these SFOV cameras was focussed on a single modality—gamma ray imaging. Recently, a hybrid system—gamma plus optical imaging—has been developed. This combination of optical and gamma cameras enables high spatial resolution multi-modal imaging, giving a superimposed scintigraphic and optical image. Hybrid imaging offers new possibilities for assisting clinicians and surgeons in localising the site of uptake in procedures such as sentinel node detection. The hybrid camera concept can be extended to a multimodal detec

... Show More
View Publication
Scopus (24)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (18)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Guggulusome - A Novel Vesicular Carriers for Enhanced Transdermal Delivery
...Show More Authors

The present work describes guggul as a novel carrier for some anti-inflammatory drugs. Guggulusomes containing different concentration of guggul with aceclofenac were prepared by sonication method and characterized for vesicle shape, size, size-distribution, pH, viscosity, spread ability, homogeneity, and accelerated stability in-vitro drug permeation through mouse skin. The vesicles exhibited an entrapment efficiency of 93.2 ± 12%, vesicle size of 0.769 ± 3μm and a zeta potential of - 6.21mV. In vitro drug release was analyzed using Franz’s diffusion cells. The cumulative release of the guggulusomes gel (G2) was 75.8% in 18 hrs, which is greater than that all the gel formulation. The stability profile of prepare

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
A study of fermi hole for some atomic systems
...Show More Authors

the electron correlation effect for inter-shell can be described by evaluating the fermi hole and partial fermi hole for Li atom comparing with Be+ and B+2 ions

View Publication Preview PDF
Publication Date
Tue May 16 2023
Journal Name
Mathematics
A Mathematical Study for the Transmission of Coronavirus Disease
...Show More Authors

Globally, the COVID-19 pandemic’s development has presented significant societal and economic challenges. The carriers of COVID-19 transmission have also been identified as asymptomatic infected people. Yet, most epidemic models do not consider their impact when accounting for the disease’s indirect transmission. This study suggested and investigated a mathematical model replicating the spread of coronavirus disease among asymptomatic infected people. A study was conducted on every aspect of the system’s solution. The equilibrium points and the basic reproduction number were computed. The endemic equilibrium point and the disease-free equilibrium point had both undergone local stability analyses. A geometric technique was used

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel Water Quality Index for Iraqi Surface Water
...Show More Authors

The study aims to build a water quality index that fits the Iraqi aquatic systems and reflects the environmental reality of Iraqi water. The developed Iraqi Water Quality Index (IQWQI) includes physical and chemical components. To build the IQWQI, Delphi method was used to communicate with local and global experts in water quality indices for their opinion regarding the best and most important parameter we can use in building the index and the established weight of each parameter. From the data obtained in this study, 70% were used for building the model and 30% for evaluating the model. Multiple scenarios were applied to the model inputs to study the effects of increasing parameters. The model was built 4 by 4 until it reached 17 parame

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 08 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of financial leverage on the market value of the shares of Iraqi commercial banks: An applied research in the Bank of Baghdad for the period (2010-2019)
...Show More Authors

The aim of the research is to know the effect of financial leverage on the market value of the stock by applying it to a sample of private Iraqi commercial banks listed in the Iraqi Stock Exchange for the period (2010-2019) and to show the extent of that effect, based on the bank’s annual reports for the mentioned period through the use of financial leverage ratios represented b (Equity multiplier, cash balance ratio), its discussion, analysis, description, inferential description, and testing of research hypotheses,

A set of conclusions has been reached, the most important of which are: The research sample banks depend in their financial structures on borrowed funds in a greater proportion than their r

... Show More
View Publication Preview PDF