The antiviral activity of leaf extracts from Datura stramonium and tomato plants inoculated with TMV, combined with 20% skimmed milk, was investigated. A TMV isolate was confirmed using bioassay, serological, and molecular approaches and subsequently used to inoculate plants. Tomato plants, both pre- and post-inoculated with TMV, were sprayed with leaf extracts from either TMV-free or infected plants, alone or mixed with 20% skimmed milk. Enzyme-linked immunosorbent assay (ELISA) using tobamovirus-specific antibodies and local lesion tests were conducted to assess antiviral activity based on virus concentration and infectivity in treated plants. The experiment followed a completely randomized design (CRD), and the Least Significant Difference (LSD) test was applied to evaluate ELISA optical density (OD) values. OD data revealed that the combination treatment (inoculated tomato leaf extract + 20% skimmed milk) inhibited TMV in tomato plants by up to 56%, showing the highest antiviral activity. This study is the first to investigate the antiviral potential of leaf extracts from TMV-infected plants.
Comparative taxonomic study has been compeleted for the species of the. genus Centaurium Hill. of Iraq. So the morphological characters were studied comparatively for the first time form Iraqi materials. Stems, leaves ,infloresences and reproductive organs characters were a good taxonomic importance. Geographical distrtribution has been done for the species of the genus in addition to the environment information. The results were presented with schedules, tables, maps and micrographs. Taxonomic key for the species separation was also presented.
The Lamiaceae L. family grows and widely distributed in Iraq. The study aimed to enumerate the species that has been preserved in several botanical herbariums: National Herbarium of Iraq- Ministry of Agriculture (BAG), University of Baghdad Herbarium (BUH), Iraq Natural History Research Center& Museum- University of Baghdad Herbarium (BUNH), College of Agricultural Engineering- University of Baghdad Herbarium (BUG), College of Agricultural Engineering Sciences- Duhok Province University Herbarium (DPUH) and College of Science - Salahddin University Herbarium (SUH). This family has not yet been registered in the Flora of Iraq. After examining more than 1000 herbarium specimens, the study found 139 species belonging to 33 genera h
... Show MoreAnticyclone of synoptic studies that influence weather and climate of Iraq, The aim of
the study is to clarify the effect variation of repetition of Anticyclone and effect on thermal
characteristic in Iraq were pressure level has been analyzed (1000) millibars and that because
of pressure level is the closet to the earth surface and the clarity of climatic phenomenon
based on a systematic analysis of synoptic seeking maps and observation and (12:00)
according to timing GMT for five climatic stations which is (Mosul, Kirkuk, Baghdad, Rutba,
and Basra) and so far three consecutive climatic cycles which is first climatic cycle for period
(1986-1976). and second climatic cycle for period (1997-1987) and third climatic cy
Objective: Detection the level of YKL-40 biochemical marker and vitamin D level in sera of Iraqi uterine cancer
females' patients.
Methodology: This study included 90 female volunteers, 30 of them were healthy volunteers who were
considered as a control group, while sixty serum samples were collected from women patients suffering from
uterine tumors (30 malignant and 30 fibroid benign tumors), benign cases were considered as a disease
control group for malignant tumors. The average age of those females was 30-75 years, which matched the
control group. All the samples were collected from Azady hospital in Kirkuk and the gynecologic department at
Medical City in Baghdad during October /2012 to May /2013. All the serum
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
Cosmetic products must be safe for use by consumers , It is also regulated and required the legislation of countries all over the world . In this study out of 80 cosmetic products analyzed and 32.5% were found to be contaminated .Products such as mascara, lip pencil and eye pencil were analyzed . The contaminants including bacteria such as Staphylococcus aureus , Staphylocoocus epidermidis , Pseudomonas aeruginosa , Escherichia coli and Klebsiella pneumonia which were ranging in number from (103-104 ) C.F.U. /ml and fungi such as Penicillium spp. , <
... Show More