An extensive survey of citrus leaf miner (CLM) , Phyllocnistis citrella Stainton parasites
and predators was conducted during 1998 and 1999 in citrus orchards and nursuries in
Baghdad, Diyala and Wasit .Five eulophid parasites were recorded for the first time on citrus
leaf miner larvae , prepupae and pupae viz. Cirrospilus sp, Pnigalio sp ., Ratzburgiola
incompleta , Tetrasticus sp. and, Neochrysocharis formosa . Parasitism rate was ranged from
15% to 63% Chrysopa carnea , Orius albidipennis , Amblyseius sp . Were observed as
predators on CLM .
The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreIn this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThis paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreBackground: Saliva plays an important role in oral health. Several salivary proteins are involved in the antimicrobial defence mechanism and are able to eliminate or inhibit bacterial growth in the oral cavity. Secretory IgA (SIgA) is one of the principal antibodies present in saliva, could help oral immunity by preventing microbial adherence, neutralizing enzymes and toxins. The aim of this study was to investigate the relationship between salivary Streptococcus Mutans (SM) count and S IgA in stimulated whole saliva in children with primary dentition compared to those with permanent teeth in relation to some oral hygiene parameters. Material and methods: Stimulated whole saliva was collected from 50 children (25 with primary dentation and
... Show MoreIn the present study ten samples of bottled water from Baghdad conservative were taken to measure the concentration of radon gas by using nuclear track detector LR-115.The result obtained are varying from(0.033)to(0.007)pCi.l-1and these values are very low than the allowed limits (5) pCi.l-1, and specific activity from bottled water has been calculated which was vary from (0.00027)to(0.00126) Bq.l-1 and these values are very low than allowed limits (0.0123) Bq.l-1 that mean the bottled water was treated with good treatment to decrease the side effect of radon
Through the researchers' acquaintance with the previous studies, the problem was identified as that the preparation of training curricula in all its units must be based on accurate scientific foundations. Positively affect the type of attack and its implication in the presence of correlational relations, whether direct or indirect, i.e., precedence in training and in preparing units Therefore, the researcher decided to build a causal model to know the relationships to show the best model of the direct straight attack. The study aimed to build a causal model for the most important physical measurements and kinetic capabilities of the direct straight attack in the research sample. The two researchers used the descriptive approach in t
... Show MoreThis study was conducted in Diyala province for renal failure patients during the periods August 2015 - April 2016. Hundred renal failure patients were enrolled in the study after diagnosis by the consultant physician at Ibn-Sina Center for Dialysis in Baquba Teaching Hospital according to criteria adopted by the World Health Organization for diagnosis of renal failure disease. The number of males in patient’s sample was 61 (61%) and females was 39 (39%) with an age range of 10 – 88 year (44.7 ± 22.1 year). In addition, the study included 50 apparently healthy individuals and considered as a group control, in which the number of males and females was similar (25 individual), with an age range of 18 – 88 year (51.7 ± 17.3 year). The
... Show More