In 2010, the tomato leaf miner Tuta absoluta (Meyrick, 1917) was reported for the first time in Iraq. The larvae can feed on all parts of tomato plants and can damage all the growth stages. The main host plant is tomato, Lycopersicon esculentum, but it can also attack other plants in Solanaceae family. In this study it was found attacking alfalfa plants, Medicago sativa in Baghdad Province. This finding reveals that alfalfa also serves as a host plant for T. absoluta in Iraq.
Objective(s): To determine the prevalence of ADHD among elementary school pupils; identify the association between pupil's level of ADHD and age, etc., and investigate the differences in pupils ADHD based on gender, and grade.
Methodology: A descriptive study was conducted on elementary school pupils. The study started from the period of 16th of September 2019 to the 1st of October 2020. A cluster sample of 800 pupils was selected. The questionnaire was constructed and developed and include two parts: the first part includes the pupil's general information and the second part includes scale of ADHD prevalence.
Results: The results of the present study indicated that 38(4.
... Show MoreObjective: To evaluate the levels of Psychological well-being among elderly people and To find out the relationship between socio-demographic characteristics and psychological well-being among elderly people who live in Geriatric centers. Methodology: A descriptive study in which evaluation approach is applied to achieve the objectives of the study the period of the study was from 29 December 2014 to 25 may 2015, The sample is non-probability (purposive sample) of 60 elderly people and selecte according to criteria of sample and for the purpose of the study , ( 40 ) are from Al Rashad and ( 20 ) Sleek
the pursue of social systems history present to us solid evidence that the collapse of that systems be caused by either the stagnancy aftermath maturity or unreal intellectual foundation which lead to sudden collapse, while the capitalism can avoided that intellectual damages due to its dynamic system with appropriate auto adaptation mechanism and use it excellently in the right time.
The globalization had excrete (as one of the capitalism adaptation mechanism) its own targets and its methods in framework of multinationals corporations which consist with capitalism states that employed the international organizations to reconstruction the global economy to serve such targets. So the glob
... Show MoreIn the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle Eas
... Show MoreA new series polymers was synthesized from reaction starting material Bisacodyl A or [(2-Pyridinylmethylene) di-4, 1-phenylene di acetate] with hydrogen bromide, then the products were polymerized by addition polymerization from used adipoyl and glutaroyl chloride. The structure of these compounds was characterized by FT-IR, melting points, TLC, X-Ray, DSC and 1H-NMR for starting material. These compounds were also screened for their antibacterial activists?
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More