Preferred Language
Articles
/
jnhm-87
A NEW HOST RECORD FOR TOMATO LEAF MINER TUTA ABSOLUTA (MEYRICK, 1917) IN BAGHDAD PROVINCE, IRAQ
...Show More Authors

  In 2010, the tomato leaf miner Tuta absoluta (Meyrick, 1917) was reported for the first time in Iraq. The larvae can feed on all parts of tomato plants and can damage all the growth stages. The main host plant is tomato, Lycopersicon esculentum, but it can also attack other plants in Solanaceae family. In this study it was found attacking alfalfa plants, Medicago sativa in Baghdad Province. This finding reveals that alfalfa also serves as a host plant for T. absoluta in Iraq.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Siam Journal On Control And Optimization
A Duality Approach for Solving Control-Constrained Linear-Quadratic Optimal Control Problems
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Tue Jun 02 2009
Journal Name
Albahith Alalami
A proposed scientific strategy for public relations activity at the Integrity Authority.
...Show More Authors

This study deals with knowing the public relations activities of the Integrity Commission for the year 2007, knowing the contents of these activities, knowing the contents of the advertisements that it published, whether the contents of the advertisements were convincing, and whether press photographs were used in these advertisements, as well as whether symbols and slogans were used. What language and words were used to address the recipient? 1- What feelings do the contents of advertisements arouse? 2- Research objectives: This research aims to answer the following questions: What are the public relations activities carried out by the Integrity Commission? B: Are the contents of the advertisements published by the Authority convincing to

... Show More
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Psychological Burnout for Teachers of Kindergarten Public and Private (A Contrastive Study)
...Show More Authors

The psychological burnout is considered one of dangerous phenomenon’s which appeared in the 70s of the 20th century and suffered by most of the society classes. It is a term which the wide uses and various meaning like emotional, mental, and physical exhaustion and chronic weak exhaustion. The presented research aims t identify the psychological burnout as for the Kindergarten teacher and the differences significance according to the variations (Kindergarten type: private or govern mental). The research sample contains 400 female teachers divided to 170 governmental Kindergarten teachers and 230 private Kindergarten teachers. The researcher prepared a measurement method to measure the psychological burnout for those teachers after

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Al-nahrain University Science
A Lexical and Syntax Checker Tool for the Hyper Text Markup Language
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
A novel improvement of skew tent map for generating Pseudo random numbers
...Show More Authors

An encryption system needs unpredictability and randomness property to maintain information security during transmission and storage. Although chaotic maps have this property, they have limitations such as low Lyapunov exponents, low sensitivity and limited chaotic regions. The paper presents a new improved skewed tent map to address these problems. The improved skew tent map (ISTM) increases the sensitivity to initial conditions and control parameters. It has uniform distribution of output sequences. The programs for ISTM chaotic behavior were implemented in MATLAB R2023b. The novel ISTM produces a binary sequence, with high degree of complexity and good randomness properties. The performance of the ISTM generator shows effective s

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Expert Systems With Applications
A long short-term recurrent spatial-temporal fusion for myoelectric pattern recognition
...Show More Authors

View Publication
Scopus (24)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Traitement Du Signal
A Comprehensive Review on Machine Learning Approaches for Enhancing Human Speech Recognition
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Sep 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Simple Method for Studying Crushability and Grindability of Rocks and Minerals
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
A spherical fuzzy AHP model for contractor assessment during project life cycle
...Show More Authors
Abstract<p>Measurement of construction performance is essential to a clear image of the present situation. This monitoring by the management team is necessary to identify locations where performance is exceptionally excellent or poor and to identify the primary reasons so that the lessons gained may be exported to the firm and its progress strengthened. This research attempts to construct an integrated mathematical model utilizing one of the recent methodologies for dealing with the fuzzy representation of experts’ knowledge and judgment considering hesitancy called spherical fuzzy analytic hierarchy process (SFAHP) method to assess the contractor’s performance per the project performance pa</p> ... Show More
View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (10)
Crossref