Field experiment was conducted by using two fertilization systems (i.e.) biofertilizers (inoculation with Pseudomonas putida and with Azotobacter chroococcum and non - inoculation) and chemical fertilization (100%, 50% and 25% of recommended by Ministry of Agriculture) to study the influence of these system and interaction on water and grain yield productivity, some growth phytohorones and number of bacterial cells in soil rizosphere of root of wheat crop under water scarcity. The result showed that the integrate fertilization (inoculation with Pseudomonas putida and Azotobacter chroococcum bacterial + 50% of the recommended chemical fertilizer) recorded 5.70 and 5.55 t ha-1, respectively with reducing the chemical fertilizer applied in these systems as single application to the half. The number of bacterial cells of Azotobacter chroococcum increased with age of wheat crop and had 34.34 × 10-6 and 37.82 × 10-6 CFU g-1 soil for inoculation with Pseudomonas putida and Azotobacter chroococcum bacterial + 50% of the recommended chemical fertilizer, respectively during the maturity stage. The integrated fertilization system offered an alternative system instead of using chemical or biofertilizers system when they use separately.
Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreThis work involves synthesis and characterization of some new 1, 3, 4-thiadiazole or pyrazoline derivatives heterocyclic containing indole ring. The new 2-amino-1, 3, 4-thiadiazole derivatives [IV] and [V] a, b were synthesized by cyclization reaction of 2-methyl-1H-indole-carbothiosemicarbazide [III] in H2SO4 acid or by reaction of indole-3-acetic acid or indole-3-butanoic acid with thiosemicarbazide in the presence of phosphorous oxychloride, respectively. Amide derivatives [VI]-[VIII] were synthesized by the reaction equimolar of 2-amino-1, 3, 4-thiadiazoles and (acetyl chloride, benzoyl chloride, anisoyl chloride and heptanoyl chloride) in DMF and pyridine as accepter. The new pyrazolone derivatives [XI] a, b were synthesized from heati
... Show MoreAbstract
were determine the problem of current research to answer the question on the consciousness of the Ministry of Agriculture to adopt Staffing strategy and identify the shortcomings as the independent variable, represented by the three dimensions (recruitment , selection, placement) and its impact on high performance, as dependent variable is described in four dimensions (leadership, strategy, structure and processes, culture), in this research were Used analytical descriptive style . This research aims to identify the correlation and impact of Staffing strategy at high-performance in Ministry of Agriculture , To clarify the relationship between
... Show MoreAbstract
The current research aims to identify the level of partnership between school and community agencies to improve secondary school outcomes for students with intellectual disabilities and develop strategies that help enhance community partnerships between schools and agencies. The researcher used the qualitative research approach; he utilized the interviews as a tool for data collection. The sample of research included (12) participants: three female school leaders, three male-school leaders, three female-school supervisors, and three male-school supervisors in schools that have programs for students with intellectual disabilities in Riyadh. The results of the study showed that the level of partnership bet
... Show Moreantimicrobial solutions against Coliforms, E. coli O157: H7, yeasts and molds were evaluated by agar well diffusion method. Chitosan (CH) exhibited best antimicrobial activity against the treated microorganisms at concentration of (5%) with contact time for 6hrs at refrigeration temperature (4ÚC), zones of inhibition for (GA) and (CH) for each solution alone ranging from (0 to 10 mm), chitosan solution (CH) exhibited both antibacterial and antifungal activities, Gum Arabic washing solution showed significant antibacterial activity (P < 0.05) against the microorganisms at concentration (15%), without inhibitory effect against E. coli O157:H7 at concentration (10%), in the current study the results confirmed that (15%) (w/v) of GA and 5%
... Show MoreAnemia of chronic disease (ACD) and iron deficiency anemia (IDA) are the two most important types of anemia in rheumatoid arthritis (RA). Functional iron deficiency in ACD can be attributed to overexpression of the main iron regulatory hormone hepcidin leading to diversion of iron from the circulation into storage sites resulting in iron-restricted erythropoiesis. The aim is to investigate the role of circulating hepcidin and to uncover the frequency of IDA in RA. The study included 51 patients with RA. Complete blood counts, serum iron, total iron binding capacity, ferritin, and hepcidin- 25 were assessed. ACD was found in 37.3% of patients, IDA in 11.8%, and combined (ACD/IDA) in 17.6%. Serum hepcidin was higher in ACD than in con
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More