Preferred Language
Articles
/
thdrvo0BVTCNdQwClRrm
Functional and numerical response of Hippodamia variegata (Goeze) (Coleoptera: Coccinellidae) on Macrosiphum rosae (L.) (Hemiptera: Aphididae)
...Show More Authors

In this study, functional and numerical response tests, which are important components in the selection of biological control agent, were carried out. In functional response trials, the amount of food consumed, attack rate (a) and handling time (Th) were calculated for each developmental period, depending on the number of preys given after 24 hours. The obtained results were evaluated with the Holling. In numerical response experiments, the development of the predator insect was examined depending on the number of preys given in certain numbers (5, 10, 20, 40 and 80) and the data were recorded. This phase of the trials continued until the individuals died. At this stage of the trials, the reproductive response of the predator on the aphid and the prey use efficiency were calculated. All of the productions and trials were carried out in climate rooms with a temperature of 27±1 °C, 65±5% RH. Experiments were carried out with 50 replications for each growth period and prey densities. According to the results obtained in the functional response trials, it was determined that the development periods with the highest productivity were the fourth larval and adult stages. When the results obtained from the numerical response experiments were evaluated, it was observed that the reproductive response increased with the increase of the prey given to H. variegata. Considering all the data obtained as a result of the study, it was concluded that H. variegata is effective on M. rosae and can be used in the control of this pest.

Crossref
View Publication
Publication Date
Fri Apr 26 2019
Journal Name
Journal Of Contemporary Medical Sciences
Cord Blood Sex Hormones Concentration: Relation to Birth Weight and Pregnancy Complications
...Show More Authors

Objectives: Umbilical cord blood can be taken at birth and largely gives indication of fetal and maternal conditions. The aim of the study was to investigate the relation between sex hormones in cord blood and birth weight of newborns and pregnancy complications. Methods: Fifty cord blood samples were collected from newborns at labor room of Baghdad Teaching Hospital between May and October 2018. Blood was withdrawn from their mothers for lead analysis. Five milliliters (ml) of cord blood was taken, 3 ml was used for testosterone and estradiol analysis (using enzyme-linked immunosorbent assay) and 2 ml for lead measurement by lead care analyzer. Newborns weight and head circumference were measured. Delivered women were divided into four gro

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Dec 08 2021
Journal Name
Scientific Reports
Weakly Supervised Sensitive Heatmap framework to classify and localize diabetic retinopathy lesions
...Show More Authors
Abstract<p>Vision loss happens due to diabetic retinopathy (DR) in severe stages. Thus, an automatic detection method applied to diagnose DR in an earlier phase may help medical doctors to make better decisions. DR is considered one of the main risks, leading to blindness. Computer-Aided Diagnosis systems play an essential role in detecting features in fundus images. Fundus images may include blood vessels, exudates, micro-aneurysm, hemorrhages, and neovascularization. In this paper, our model combines automatic detection for the diabetic retinopathy classification with localization methods depending on weakly-supervised learning. The model has four stages; in stage one, various preprocessing techniques are app</p> ... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Copper Nanoparticles Synthesized in Biopolymer Matrix and Their Application in Antibacterial Activity
...Show More Authors

Copper is a cheaper alternative to various noble metals with a range of potential applications in the field of nanoscience and nanotechnology. However, copper nanoparticles have major limitations, which include rapid oxidation on exposure to air. Therefore, alternative pathways have been developed to synthesize metal nanoparticles in the presence of polymers and surfactants as stabilizers, and to form coatings on the surface of nanoparticles. These surfactants and polymeric ligands are made from petrochemicals which are non- renewable. As fossil resources are limited, finding renewable and biodegradable alternative is promising.The study aimed at preparing, characterizing and evaluating the antibacterial properties of copper nanoparticle

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sat Jun 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Thickening Time and Compressive Strength Correlations for Bentonitic- Class "G" Cement Slurries
...Show More Authors

Empirical equations for estimating thickening time and compressive strength of bentonitic - class "G" cement slurries were derived as a function of water to cement ratio and apparent viscosity (for any ratios). How the presence of such an equations easily extract the thickening time and compressive strength values of the oil field saves time without reference to the untreated control laboratory tests such as pressurized consistometer for thickening time test and Hydraulic Cement Mortars including water bath ( 24 hours ) for compressive strength test those may have more than one day.

View Publication Preview PDF
Publication Date
Sat Mar 25 2023
Journal Name
International Journal Of Drug Delivery Technology
The Probable Association between Type 2 Diabetes Mellitus and Toxoplasma gondii Infection
...Show More Authors

Background: Type 2 diabetes mellitus (T2DM) is a chronic disorder that constitutes a major health problem worldwide. Toxoplasma gondii is an intracellular parasite that may infect any nucleated cell. Toxoplasmosis is becoming a worldwide health threat, infecting 30–50% of the world’s human population. The studies that have been undertaken to investigate the link between T. gondii infection and diabetes have shown contradictory fi ndings. This research aimed to look at the possible link between T2DM and T. gondii infection. Methods and Subjects: The enzyme-linked immunosorbent assay (ELISA) approach was used to screen for T. gondii IgM and IgG antibodies in 69 patients with T2DM and 92 seemingly healthy persons as controls. Resul

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The security environment in Northeast Asia between American authority and Chinese influence
...Show More Authors

The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.

Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional lea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2025
Journal Name
Mastering The Minds Of Machines
Unsupervised Learning: Discovering Patterns without Labels: Health Care, E-Commerce, and Cybersecurity
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Using simulation to estimate parameters and reliability function for extreme value distribution
...Show More Authors

   This study includes Estimating scale parameter, location parameter  and reliability function  for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).

 Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref