In 2010, the tomato leaf miner Tuta absoluta (Meyrick, 1917) was reported for the first time in Iraq. The larvae can feed on all parts of tomato plants and can damage all the growth stages. The main host plant is tomato, Lycopersicon esculentum, but it can also attack other plants in Solanaceae family. In this study it was found attacking alfalfa plants, Medicago sativa in Baghdad Province. This finding reveals that alfalfa also serves as a host plant for T. absoluta in Iraq.
Construction is a complicated process that takes place in an almost uncontrollable environment. Although projects can be carefully planned in advance in principle, there is a chance that unforeseen events and crises can disrupt these plans, affecting project development. Because the initial investment expenditures in construction projects are so large, they may be quickly influenced by crises, resulting in significant financial losses. The 2014 financial crisis was one of the most prominent crises that Iraq faced, which significantly impacted various activities in general and the construction industry in particular. Despite the importance of crisis management systems, the researchers found a great lack of local studies looking at cr
... Show Morepublishing has become a large space in the field of interactive education and modern pages have become dedicated to the service of the educational effort in this area as the research in this context of the urgent scientific necessities, especially as we consider in Iraq from the new countries in the exploitation of these new technologies and investment possibilities of the information network And the contents of different in the framework of so-called distance education Here lies the problem of research in the possibility of finding scientific solutions for the design of interactive inter active website for students of the preparatory stage in Iraq and to find out the scientific ways to find design The study, which included the problem of
... Show MoreExtracting, studying and interpreting the morphological database of a basin is a basic building block for building a correct geomorphological understanding of this basin. In this work, Arc GIS 10.8 software and SRTM DEM satellite images were used. The principle of data integration was adopted by extracting the quantitative values of the morphometric characteristics that are affected by the geomorphological condition of the studied basin, then eliciting an optimal conception of the geomorphological condition of the basin from the meanings and connotations of these combined transactions. Hypsometric integration was extracted for each region in the basin separately with the value of integration of the plot curve for the relative heights of
... Show MoreBecause the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat
... Show MoreA new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More