An experiment was carried out in the fields that belong to agiriculture college /Baghdad university (AL-Jadyria) according to randomized compeleted blocks design(R.C.B.D.) with three replications during the spring season of 2015 to Study impact of growing point pinching and foliar spraying of whey on some traits of vegetative growth and yield of okra(Abelmoschus esculentus L.Moench) AL-Batra local cultivar.The experiment was included six treatments which was pinching or no pinching of growthing point and foliar spraying of whey with three concentration (0%,50%and75%).The results showed that pinching was siginificant in all traits of vegetative growth except plant High where the highest values of branches number , diameter of stem and leafes numbers which were(1.911 branch/plant , 3.45 cm/plant ,84.0 leaf/plant) respectively while there was not significant differences in foliar spraying of whey in all traits except plant high which was(163.6 cm/plant)with 75%. The interaction between pinching and foliar spraying of whey with(75%)was significant to plant high and branches number which were (167.0 cm/plant and 2.133 branch/plant) respectively and the interaction between pinching and comparison treatment of whey(0%) was significant to diameter of stem and leafes number which were (3.67 cm/plant and 88.80 leaf/plant) respectively. The results point out that pinching treatments were not significant in all traits of yield while whey fliar spraying with(50%) was significant to fruit weight average and yield per plant which were (2.76 gm/plant and 0.2103 kg/plant) respectively. The interaction between pinching and comparison treatment of whey(0%) was significant to fruits number per plant which was(82.7 fruit/plant) and interaction between pinching and foliar spraying of whey with(50%) was significant to fruit weight average and yield per plant which were(2.92 gm/fruit and 0.228 kg/plant) respectively.
The development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste
... Show MoreIdentification of pathogens and locating their inocul¬um source (S) are the first strategies toward successful disease management program the pretransplating seedl¬ing damping - off problem on vegetable crops was found to be caused by Pythium aphanidermatum and Rhizocto¬nia solani. Both fungi were isolated from peat (moss) for the first time in Iraq. In addition, considerable num¬ber of pathogenic fungi was found as contaminants in soil samples from Alrashidiah vegetable covered farming station. Among the isolated fungi were: Pythium apha¬nidermatum, Rhizoctonia solani, Sclerotinia sclerotiorum, Fusarium oxysporum, Fusarium solani phialophora spp., Cephalisporium spp Rizopus stolonfier and Botrytis cine¬rea, in addition to several
... Show MoreAbstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More