Preferred Language
Articles
/
BxaX3IsBVTCNdQwCROLK
Influence of adding ascorbic acid and yeast on growth and yield and Rhizobium of snap bean (Phaseolus vulgaris L.) under irrigation with saline water
...Show More Authors

A field experiment was carried out in Horticulture Department / Collage of Agricultur e/University of Baghdad to study influence of adding ascorbic acid(asa) and bread yeast extract in snap bean cv.primel under irrigation with saline water using sodium chloride salt (NaCl) during spr ing season of 2016 .A factorial experiment using Randomized Complete Block Design( RCBD) with three replications wereconducted . The first factor includes three treatments of salinity which were tap water ( S0), 4ds.m-1(S1) and 8ds.m-1 (S2) . The second factor includes three treatments which were control treatment without any adding (C) ,ascorbic acid 0.3g.l-1( A ) and yeast extract 12g.l -1( Y ). Results showed significant and gradually decreases in all studied traits of vegetative growth , yield , leaves content of prolien and rhizobia viability by increasing salinity level. The superiority of yeast extract ( Y ) adding was observed in root nodules/plant ,dry weight/plant, pods number/plant, pod weight, pods yield/plant,prolien content and rhizobia viability while highest value observed in both of plant height and leaf area due to ascorbic acid .The correlatio ns among all the studied traits were significant and positive except in prolien content with other traits were negative and sig nificant .

View Publication
Publication Date
Thu Feb 26 2026
Journal Name
Journal Of Studies And Researches Of Sport Education
The effectiveness of the use of yoga exercises and its impact on the reactions of the two Alvesologih nervous and respiratory systems in the correction of antenna pistol shooting accuracy
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Strategic leadership and It's Impact on Achieving The Organizational Reputation
...Show More Authors

Abstract :

This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
CFD Application on Shell and Double Concentric Tube Heat Exchanger
...Show More Authors

This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).

Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors.  The RNG k-ε model of turbulence is used to determining the accurate results from CFD.

The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The general budget and censorship on it in Iraqi legislation
...Show More Authors

The main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 08 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Strategic tax planning and its impact on reducing tax evasion
...Show More Authors

Taxes are an essential axis in the economy as the most effective and effective economic tool in any country (economy). Expanding the scope of taxation without adequate study has produced a dangerous result with a negative impact that is almost apparent, namely (tax evasion), which stands as a barrier preventing the state from reaching Therefore, the research sought to study strategic tax planning and its importance in reducing tax evasion, and the research aims from that to prove the importance of adopting strategic planning in the field of taxes according to modern and effective scientific foundations to reduce tax evasion to enhance the achievement of tax evasion. The financing objective is in addition to the other objectives,

... Show More
View Publication Preview PDF