Morphological and phonological studies of fungal pathogen infecting alfalfa weevil Hypera postica (Gyllenhal) indicating that infection has been shown to develop along two distinct physiological lines, each culminating in the production of either conidial or resting spores, in host cadavers which are morphologically distinct. The percent of infection and epizootic development appeared to be dependent on host density. Farther evidence to entail proper correlation between conidia and resting spores suggest that these two forms of spores are stages in the development of one pathogen.
Background: This study was performed to determine the effect of aging of different types of composite material restorations on: Shear bond strength (SBS) to light cure and no mix chemical cure orthodontic adhesives with sapphire bracket and the debonding failure sites. Materials and methods: One hundred forty four composite disks were made from three different composite resin materials which are: 3M Filtek Z250, 3M filtek Z350 and 3M Valux plus, each group with (48) disks each, then according to the duration of storage each group was subdivided into two equal groups one of them stored for one day and the other was stored for one month, then each group was further subdivided into two equal subgroups with (12) disks each one bonded with ligh
... Show MoreIn the pandemic era of COVID19, software engineering and artificial intelligence tools played a major role in monitoring, managing, and predicting the spread of the virus. According to reports released by the World Health Organization, all attempts to prevent any form of infection are highly recommended among people. One side of avoiding infection is requiring people to wear face masks. The problem is that some people do not incline to wear a face mask, and guiding them manually by police is not easy especially in a large or public area to avoid this infection. The purpose of this paper is to construct a software tool called Face Mask Detection (FMD) to detect any face that does not wear a mask in a specific
... Show MoreThe current study aims to identify the artistic expression as well as the aspects of artistic expression by the painting among the kindergarten children. In order to fulfill the research's goals, a sample of (400) children were chosen randomly from 19 public kindergartens of 6 directorates at Al-Rusafa and Al-Karkh in Baghdad city. The children were asked to draw a particular view. The researcher has adopted Al-Hamedawi scale (2009) consisted of (16) items, which was exposed to group of (25) experts in psychology, education, measurement and evaluation, artistic education by painting and plastics to show the items reliability. As the researcher applied T-test for 
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
Objectives: To assess the performance of a novel resin-modified glass-ionomer cement (pRMGIC) bonded to various tooth tissues after two-time intervals. Methods: 192 sound human molars were randomly assigned to 3 groups (n = 64): sound enamel, demineralised enamel, sound dentine. Sixty-four teeth with natural carious lesions including caries-affected dentine (CAD) were selected. All substrates were prepared, conditioned and restored with pRMGIC (30% ethylene glycol methacrylate phosphate (EGMP, experimental), Fuji II LC (control), Fuji IX, and Filtek™ Supreme with Scotchbond ™ Universal Adhesive. Shear bond strength (SBS) was determined after 24 h and three months storage in SBF at 37C. The debonded surfaces were examined using stereomi
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show More