During 2019-2020, the experiment was conducted in the laboratory of the Department of Field Crop Sciences, Faculty of Agricultural Engineering Sciences - Baghdad University, to investigate the impact of soaking wheat seeds produced during the 2016 agricultural season with three plant extracts (licorice root extract 2%, 4% and 6%, Acadian and Humic(500, 1000, & 1500 mg L-1). Aside from the two control treatments (soaking in distilled water with dried seeds). The results show that the soaking treatment with licorice root extract outperformed the other therapies in conventional laboratory germination, root length, and seedling vigor index (95 percent and 3.42 cm 1207) compared to the two control treatments (soaking with distilled water and dry seeds). While all the Humic and Acadian soaking treatments at the concentrations (500 and 1000) mg L-1 did not significantly differ with the distilled water soaking treatment.The characteristics of standard laboratory germination percentage, root length, coleoptile length and seedling vigor index. Thus, we conclude that soaking wheat seeds with high concentrations of Acadian (more than 1000 mg L-1) leads to a deterioration in the vitality of the seeds. While soaking with licorice root extract enhances the vibrancy and activity of wheat seeds compared to the other extracts used. As a result, we propose soaking the somewhat old and low-vital wheat seeds in a concentration of at least 2% licorice root extract. Keywords: Radicle dry weight, Seedling vigor, seed germination, seed storage.
When laser light incident on biological tissue, it is either reflected from the
surface of the tissue (e.g. the skin) or scattered inside the tissue or absorbed .The laser light will be
absorbed by water, hemoglobin and melanin. Absorption is also highly dependent on wave-length of
laser radiation. The absorbed light is converted into kinetic energy leading to laser effect that when
appropriately applied can produce reaction ranging from incision, vaporization to coagulation. Aim of
the study: To evaluate the efficiency of diode Laser 810 ± 20nm in treatment of oral lesions. Methods:
6 patients (2 females and 4 males) with different oral lesions were treated in the hospital of specialized
surgeries by the use of dio
In this research we prepared nanofibers by electrospinning from
poly (Vinyl Alcohol) /TiO2. The spectrum of the solution (Emission)
was studied and found to be at 772 nm, several process parameters
were such as concentration of TiO2 , and the effect of distance from
nozzle tip to the grounded collector (gap distance). The result of the
lower concentration of, the smaller the diameter of nanofiber is.
Increasing the gap distance will affect nanofibers diameter
Undesirable behaviors among students are consider one of the danger problems threating societies and educational and scientific institutions of countries because its one of the way to express aggression , so the instructors consider one of the most important people could be trust their evaluation and logical view , therefore the present research aimed to :
- Recognize undesirable behavior in students of University by the view of their instructors
- Measure the level of undesirable behavior in students of university by the view of their instructors
- Recognize more common undesirable behavior in students of University by the view o
Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More