This study was conducted to determine the fungal cause and bio control of damping off and root rot of wheat plants by using pseudomonas fluorescens under greenhouse and field conditions. Results showed isolation of eight species from the soil and roots to deferent region of Baghdad government. Rhizoctonia solani (Rs) and Fusarium solani (Fs) were the predominant damping off fungus with frequency 60 and 52% respectively. Led the using of bacteria formulations such as crud suspension , pure bacteria filtration and pure living cells in culture medium inhibit all type fungi with rates ranging from 84-96% , 80- 93% and 75-88% respectively. Rs and Fs were more pathogenesis under greenhouse conditions, with incidence of 80 and 68% and disease severity up to 41,20 and 30,20% respectively. The results of test bacterial formulation (dry, liquid and bacterial filtrate ) with seeds, soil and water irrigation showed high effectiveness for all treatments with superiority of the treatment of seeds in reducing the incidence which reached for the three formulation 21-34% compared with the infested control of Fs, Rs which reached 70 and 55%, respectively. Field experiments results showed superiority of seeds bacterization with dry formulation to reduce the disease incidence to 38% compared with the infested control (75%).These results reflected on the increasing of the shoot and rot dry weight and increasing the productivity (63%) compared with the infested control treatment .
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreHeart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIt is no secret to anyone that studying and investigating books of jurisprudence, despite their suffering, is a pleasure that cannot be compared to pleasure, and it has benefits and importance that cannot be limited and summed up, and it has great fruits that researchers and students of knowledge reap, as well as enriching libraries with jurisprudential material, after dusting them and taking them out to the light of libraries to be seen. Researchers and scholars, generation after generation, so that this nation can benefit from this pioneering intellectual and scientific product that was written for us by our first ancestors of working scholars who enriched human civilization with this scientific material, which has become a beacon guid
... Show MoreThis study aims to identify the impact of using the infrastructure of the Information Technology (IT) on the performance of human resources in the public universities. This process is done by doing research in the size, quality, and efficiency of the performance, also speed of achievement and simplification of procedures. Diyala University was chosen for the diagnosis through the opinions and attitudes of its employees. Consequently, suggestions that contribute to improve the performance of the employees and thus its overall performance are obtained. Another objective of this study is identifying the human resources which are currently used in academic institutions and educational services systems because the significant role of th
... Show MoreA fixed callus weight of 150 mg was induced from immature embryos of three bread wheat Triticum aestivum L. genotypes (Tamos 2, El-izz and Mutant 1) cultured on nutrient medium {MS) containing Polyethylene glycol (PEG-6000) supplemented with concentrations (0.0, 3.0, 6.0, 9.0 or 12.0%) to evaluate their tolerance to water stress. Cultures were incubated in darkness at temperature of 25?1 ?C. Callus fresh and dry weights were recorded and soluble Carbohydrate and the amino acid Proline concentrations were determined. Results showed that there were significant differences in studied parameters among bread wheat genotypes of which Tamos 2 was higher in callus average fresh and dry weights which gave 353.33 and 38.46 mg/cultured tube respecti
... Show MoreInfection with the protozoan parasite Toxoplasma gondii is widely prevalent in humans and animals. Infection with Toxoplasma may associate with miscarriage in many pregnant women due to infection. In this study, the level of lutetropic hormone (LTH), folliclestimulating hormone (FSH) and luteinizing hormone (LH) was measured in pregnant women suffering from toxoplasmosis using mini-VIDAS®technique. Results showed that pregnant women have high concentration of both LTH and FSH hormone(10.80 ± 6.53) ng/ml and (9.51 ± 2.40) μIU/ml respectively, while the concentration of LH hormone was lower than normal(4.49 ± 0.56) μIU/ml. Such finding is to suggest that infection with T. gondii is interfering with these hormones in pregnant women.
The meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when
... Show More