Reproduction potential and age –specific fecundity of the Mealybug Planococcus citri Risso were studied in the laboratories of Biological control research unit,college of Agriculture –Baghdad university at 25± 2Cº and 60-70% R.H.with 16 light:8 dark photo period.The results showed that the survival ratio began to decline at the 38th day, the average female age was 20 days ,while the average age was 8 days at the first reproduction . Net reproduction rate ( Ro ) was 58.59 female female generation which prove that the population of the mealybug was of the unstable kind , intrinsic rate of increase (rm) was 0.118 femalefemale and the average length period of generation ( T ) was 34.30 days . Many local predators attack the mealybug
... Show MoreDAIRMD Professor Hayder R. Al-Hamamy, **Professor Adil A. Noaimi, **Dr. Ihsan A. Al-Turfy, IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2015
HR Al-Hamamy, AA Noaimi, IA Al-Turfy, AI Rajab, Journal of Cosmetics, Dermatological Sciences and Applications, 2015
The applications of Multilevel Converter (MLC) are increased because of the huge demand for clean power; especially these types of converters are compatible with the renewable energy sources. In addition, these new types of converters have the capability of high voltage and high power operation. A Nine-level converter in three modes of implementation; Diode Clamped-MLC (DC-MLC), Capacitor Clamped-MLC (CC-MLC), and the Modular Structured-MLC (MS-MLC) are analyzed and simulated in this paper. Various types of Multicarrier Modulation Techniques (MMTs) (Level shifted (LS), and Phase shifted (PS)) are used for operating the proposed Nine level - MLCs. Matlab/Simulink environment is used for the simulation, extracting, and ana
... Show MoreThe present study aims to investigate the long-term histopathological, and physiological effects of different concentrations of a commercially available energy drink (Tiger) on liver and kidney of young mice. Sixteen Balb/c male mice,6 -week old, were divided into 4 groups (n=4). Two groups consumed the energy drink at a concentration of 28µl energy drink/ml water. One group were killed after 10 days (T1), another group were killed after 20 days (T2). Other group of mice consumed the energy drink at a final concentration of 14µl/ml for 20 days (T3). The last group was provided only with water and served as control. Mice of all groups drank around 3 ml per day. The histopathological study on liver of treated groups showed many changes s
... Show MoreAbstract This study aims to compare British war poetry of the First World War with Iraqi poetry from the mid-20th century with special reference to Iraqi war poetry of the 1980’s Iraq-Iran War and the period that followed it. It will also investigate the influence of the designated British war poetry on the chosen body of Iraqi poetry. Through the comparison of sample poems the study presents, firstly, the direct influence of the British poetry of the Great War and its translation which formed the seeds of a more radical movement in Iraqi poetry during the 1980’s Iran/Iraq War and the period that followed it. The study also presents a comparison of the works of British and Iraqi civilian poets during and after the war time and their con
... Show MoreIn this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal
... Show MoreBackground: The success and maintenance of indirect dental restorations is closely related to the marginal accuracy, which is affected by many factors like preparation design, using of different fabrication techniques, and the time of taking final impression and pouring it. The purpose of this in vitro study was to evaluate the effect of different pouring time of conventional impression on the vertical marginal gap of full contour zirconia crowns in comparison with digital impression technique. Materials and Methods: Forty sound recently extracted human permanent maxillary first premolar teeth of comparable size and shape were collected. Standardized preparation of all teeth samples were carried out to receive full contour zirconia crown re
... Show MoreBackground: The success and maintenance of indirect dental restorations is closely related to the marginal accuracy, which is affected by many factors like preparation design, using of different fabrication techniques, and the time of taking final impression and pouring it. The purpose of this in vitro study was to evaluate the effect of different pouring time of conventional impression on the vertical marginal gap of full contour zirconia crowns in comparison with digital impression technique. Materials and Methods: Forty sound recently extracted human permanent maxillary first premolar teeth of comparable size and shape were collected. Standardized preparation of all teeth samples were carried out to receive full contour zirconia crown re
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show More