Preferred Language
Articles
/
jnhm-87
A NEW HOST RECORD FOR TOMATO LEAF MINER TUTA ABSOLUTA (MEYRICK, 1917) IN BAGHDAD PROVINCE, IRAQ
...Show More Authors

  In 2010, the tomato leaf miner Tuta absoluta (Meyrick, 1917) was reported for the first time in Iraq. The larvae can feed on all parts of tomato plants and can damage all the growth stages. The main host plant is tomato, Lycopersicon esculentum, but it can also attack other plants in Solanaceae family. In this study it was found attacking alfalfa plants, Medicago sativa in Baghdad Province. This finding reveals that alfalfa also serves as a host plant for T. absoluta in Iraq.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 15 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Screening for Attention Deficit Hyperactivity Disorder at Elementary Schools in Baghdad City
...Show More Authors

Objective(s): To determine the prevalence of ADHD among elementary school pupils; identify the association between pupil's level of ADHD and age, etc., and investigate the differences in pupils ADHD based on gender, and grade.

Methodology: A descriptive study was conducted on elementary school pupils. The study started from the period of 16th of September 2019 to the 1st of October 2020. A cluster sample of 800 pupils was selected. The questionnaire was constructed and developed and include two parts: the first part includes the pupil's general information and the second part includes scale of ADHD prevalence.

Results: The results of the present study indicated that 38(4.

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 13 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Psychological Well-being for Elderly People at Geriatric Centers in Baghdad City
...Show More Authors

Objective: To evaluate the levels of Psychological well-being among elderly people and To find out the relationship between socio-demographic characteristics and psychological well-being among elderly people who live in Geriatric centers. Methodology: A descriptive study in which evaluation approach is applied to achieve the objectives of the study the period of the study was from 29 December 2014 to 25 may 2015, The sample is non-probability (purposive sample) of 60 elderly people and selecte according to criteria of sample and for the purpose of the study , ( 40 ) are from Al Rashad and ( 20 ) Sleek

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Alexandria Engineering Journal
A new tilted aerial robotic platform: Modeling and control
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Economic globalization adapts to a new stage of development
...Show More Authors

the pursue of social  systems history present to us solid evidence that the collapse of  that systems be caused by either the stagnancy aftermath maturity or unreal intellectual foundation which lead to sudden collapse, while the capitalism can avoided that intellectual damages due to its dynamic system with appropriate  auto adaptation mechanism and use it excellently in the right time.

The globalization had excrete (as one of the capitalism adaptation mechanism) its own targets and its methods in framework of multinationals corporations which consist with capitalism states that employed the international organizations to reconstruction the global economy to serve such targets. So the glob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Towards a new global leadership to combat international terrorism
...Show More Authors

In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle Eas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Synthesis and Characterization of New Polymer from Bisacodyl A
...Show More Authors

A new series polymers was synthesized from reaction starting material Bisacodyl A or [(2-Pyridinylmethylene) di-4, 1-phenylene di acetate] with hydrogen bromide, then the products were polymerized by addition polymerization from used adipoyl and glutaroyl chloride. The structure of these compounds was characterized by FT-IR, melting points, TLC, X-Ray, DSC and 1H-NMR for starting material. These compounds were also screened for their antibacterial activists?

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Tue Jul 01 2025
Journal Name
Minerva Dental And Oral Science
Evaluation of the microleakage of new bioactive restorative materials: a comparative in-vitro study
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Jan 29 2021
Journal Name
Research Journal Of Pharmacy And Technologythis Link Is Disabled.
Exploration of a new fluoride resistance gene (Fram gene) in oral streptococcus mutans maw
...Show More Authors