Preferred Language
Articles
/
6RZmuYsBVTCNdQwCO9ee
Wheat seed deterioration stimulated by plant extracts
...Show More Authors

During 2019-2020, the experiment was conducted in the laboratory of the Department of Field Crop Sciences, Faculty of Agricultural Engineering Sciences - Baghdad University, to investigate the impact of soaking wheat seeds produced during the 2016 agricultural season with three plant extracts (licorice root extract 2%, 4% and 6%, Acadian and Humic(500, 1000, & 1500 mg L-1). Aside from the two control treatments (soaking in distilled water with dried seeds). The results show that the soaking treatment with licorice root extract outperformed the other therapies in conventional laboratory germination, root length, and seedling vigor index (95 percent and 3.42 cm 1207) compared to the two control treatments (soaking with distilled water and dry seeds). While all the Humic and Acadian soaking treatments at the concentrations (500 and 1000) mg L-1 did not significantly differ with the distilled water soaking treatment.The characteristics of standard laboratory germination percentage, root length, coleoptile length and seedling vigor index. Thus, we conclude that soaking wheat seeds with high concentrations of Acadian (more than 1000 mg L-1) leads to a deterioration in the vitality of the seeds. While soaking with licorice root extract enhances the vibrancy and activity of wheat seeds compared to the other extracts used. As a result, we propose soaking the somewhat old and low-vital wheat seeds in a concentration of at least 2% licorice root extract. Keywords: Radicle dry weight, Seedling vigor, seed germination, seed storage.

Scopus Crossref
View Publication
Publication Date
Tue Nov 01 2016
Journal Name
Current Science
Histopathological changes in golden hamsters induced by Leishmania tropica
...Show More Authors

.

Preview PDF
Publication Date
Wed Dec 15 2010
Journal Name
Iraqi Journal Of Laser
Treatment of Oral Conditions by 810 nm Diode Laser
...Show More Authors

When laser light incident on biological tissue, it is either reflected from the
surface of the tissue (e.g. the skin) or scattered inside the tissue or absorbed .The laser light will be
absorbed by water, hemoglobin and melanin. Absorption is also highly dependent on wave-length of
laser radiation. The absorbed light is converted into kinetic energy leading to laser effect that when
appropriately applied can produce reaction ranging from incision, vaporization to coagulation. Aim of
the study: To evaluate the efficiency of diode Laser 810 ± 20nm in treatment of oral lesions. Methods:
6 patients (2 females and 4 males) with different oral lesions were treated in the hospital of specialized
surgeries by the use of dio

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 19 2024
Journal Name
Al-rafidain J Med Sci
Assessment of High Risk Pregnant Women by Fetal Echocardiography
...Show More Authors

Scopus
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
Preparation of Polyvinyl Alcohol/ Tio2 Nano Fiber by Electrospinning
...Show More Authors

In this research we prepared nanofibers by electrospinning from
poly (Vinyl Alcohol) /TiO2. The spectrum of the solution (Emission)
was studied and found to be at 772 nm, several process parameters
were such as concentration of TiO2 , and the effect of distance from
nozzle tip to the grounded collector (gap distance). The result of the
lower concentration of, the smaller the diameter of nanofiber is.
Increasing the gap distance will affect nanofibers diameter

View Publication Preview PDF
Publication Date
Sat Mar 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
D-Sorbitol Production by Catalytic Hydrogenation of D-Glucose
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Sep 11 2018
Journal Name
Association Of Arab Universities Journal Of Engineering
Estimation of the Total Dissolved Salts by Hydrometer Test
...Show More Authors

View Publication
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
Undesirable behaviors for university students by their instructors view
...Show More Authors

Undesirable behaviors among students  are consider one of the danger problems threating societies and educational and scientific institutions of countries  because its one of the way to express aggression , so the instructors consider one of the most important people could be trust their evaluation and logical view , therefore the present research aimed to :

  1. Recognize undesirable behavior in students of University by the view of their instructors
  2. Measure the level of undesirable behavior in students of university by the view of their instructors
  3. Recognize more common  undesirable behavior in students of University by the view o

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Estimate The Survival Function By Using The Genetic Algorithm
...Show More Authors

  Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Online Journal Of Veterinary Research
Article review: Infections by gram + bacteria in laboratory mice
...Show More Authors