Begomoviruses infecting zucchini squash were investigated. Leaf samples were collected from zucchini squash growing areas in Baghdad (Jhadryaa and Yusufiyah), Babylon (Jibela and Mahmudiyah) and Diyala (Khan Bani Saad) Provinces. Samples were screened for the presence of begomoviruses using polymerase chain reaction (PCR) and Deng genus specific primers. Sixteen out of 40 samples were begomovirus positive. Sequence analysis confirmed the detection of Tomato leaf curl Palampur virus (TLCPALV)
Contamination of the operating theatre is a major cause of nosocomial infection. This report aimed to show the types of microorganisms and their percentages cultivated from operating theatres of 16 health directorates of 14 Iraqi governorates (3 health directorates in Baghdad and 1 in each other 13 governorates) that was reported to the Pollution Control Section at Ministry of Health in Iraq from first of January to the end of June 2018. The data of all health directorates have included cultivation taken from governmental and private hospitals. Duhok, Erbil, Sulaymaniyah, and Nineveh were not involved in this report due to unavailability of their data during the above period. Escherichia coli, Pseudomonas aeruginosa and Staphylococcus aureu
... Show MoreI came back and made my jewelery from the first research or studies known to man, and the oldest era and confirmed the problem of searching for the links of sweets and admiration of the magnificence of the effectiveness of the search for the importance of preserving the heritage of the Iraqi civilization in its original creative aspects. Metal in Iraq, Head Costume, Neck Costume, Party Costume (Hands and Legs). The main results of the research were;
1-Contemporary folk jewelry in Iraq was characterized by design units for use.
Dependence in the feed industry in the form of laboratory mold.
The study area is witnessing divergence where I am North wind North East wind as we find that the north wind is getting replicated as we move from the south, The reason can be attributed to the nature of the surface of the region, with at least repeat this wind the northern region to the presence of mountain ranges, while we find that energizes the surface in the center and south helped to increase repeat this wind gusts, It also finds that the North wind East prevail in the northern region and least replicated as we move from the north to the south and to the fact that North stations are within blowing this wind sites for the circles near the display of high pressure located centers to the north-east, north and distancing itself from pa
... Show MoreBumpiness in the atmosphere is the vertical movement of air, whether
upward or downward movement and the bumpiness is accompanied by areas
of unrest in the air and wind. And contribute to each of the coups thermal
fronts, wind, wind and thunderstorms. Moreover, bumpiness is net of the
reasons that lead to circumstances is appropriate to cut the wind, and this
contributes to the formation of bumpiness in the atmosphere. The study found
that the noon of the times, which is expected to occur where clear-air
bumpiness during flights because of the warmth of the earth's surface. The
study found increased incidence of air hole during the summer, especially
July, due to increased incidence of coup surface, while the s
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThis paper proposes a new method Object Detection in Skin Cancer Image, the minimum
spanning tree Detection descriptor (MST). This ObjectDetection descriptor builds on the
structure of the minimum spanning tree constructed on the targettraining set of Skin Cancer
Images only. The Skin Cancer Image Detection of test objects relies on their distances to the
closest edge of thattree. Our experimentsshow that the Minimum Spanning Tree (MST) performs
especially well in case of Fogginessimage problems and in highNoisespaces for Skin Cancer
Image.
The proposed method of Object Detection Skin Cancer Image wasimplemented and tested on
different Skin Cancer Images. We obtained very good results . The experiment showed that
Abstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show More