In 2010, the tomato leaf miner Tuta absoluta (Meyrick, 1917) was reported for the first time in Iraq. The larvae can feed on all parts of tomato plants and can damage all the growth stages. The main host plant is tomato, Lycopersicon esculentum, but it can also attack other plants in Solanaceae family. In this study it was found attacking alfalfa plants, Medicago sativa in Baghdad Province. This finding reveals that alfalfa also serves as a host plant for T. absoluta in Iraq.
The current study aims to identify soil pollutants from heavy metals The study utilized 40 topsoil (5 cm) samples, which adapted and divided into seven regions lies in Baghdad governorate, included (Al-Husainya,(Hs) Al-Doura (Do), Sharie Al-Matar (SM), Al-Waziria (Wz), Nharawan (Nh), Abu Ghraib (Abu) and Al-Mahmoodyia (Mh)). Spatial distribution maps of Nickel (Ni), Manganese (Mn), Lead (Pb) and Zinc (Zn) were created for Baghdad city using Geographic Information Systems (GIS). The concentrations of four heavy metals in the soil of different area of Baghdad were measured and observed using XRF instrument. The result found highest values of Pb and Zn at the middle of the Baghdad in (Wz
A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreObjective: To evaluate the levels of Psychological well-being among elderly people and To find out the relationship between socio-demographic characteristics and psychological well-being among elderly people who live in Geriatric centers. Methodology: A descriptive study in which evaluation approach is applied to achieve the objectives of the study the period of the study was from 29 December 2014 to 25 may 2015, The sample is non-probability (purposive sample) of 60 elderly people and selecte according to criteria of sample and for the purpose of the study , ( 40 ) are from Al Rashad and ( 20 ) Sleek
Objective(s): To determine the prevalence of ADHD among elementary school pupils; identify the association between pupil's level of ADHD and age, etc., and investigate the differences in pupils ADHD based on gender, and grade.
Methodology: A descriptive study was conducted on elementary school pupils. The study started from the period of 16th of September 2019 to the 1st of October 2020. A cluster sample of 800 pupils was selected. The questionnaire was constructed and developed and include two parts: the first part includes the pupil's general information and the second part includes scale of ADHD prevalence.
Results: The results of the present study indicated that 38(4.
... Show More