Preferred Language
Articles
/
LxZbDIwBVTCNdQwChPca
Comparing simple root phenotyping methods on a core set of rice genotypes
...Show More Authors
Abstract<p>Interest in belowground plant growth is increasing, especially in relation to arguments that shallow‐rooted cultivars are efficient at exploiting soil phosphorus while deep‐rooted ones will access water at depth. However, methods for assessing roots in large numbers of plants are diverse and direct comparisons of methods are rare. Three methods for measuring root growth traits were evaluated for utility in discriminating rice cultivars: soil‐filled rhizotrons, hydroponics and soil‐filled pots whose bottom was sealed with a non‐woven fabric (a potential method for assessing root penetration ability). A set of 38 rice genotypes including the Oryza<styled-content style="fixed-case">SNP</styled-content> set of 20 cultivars, additional parents of mapping populations and products of marker‐assisted selection for root <styled-content style="fixed-case">QTL</styled-content>s were assessed. A novel method of image analysis for assessing rooting angles from rhizotron photographs was employed. The non‐woven fabric was the easiest yet least discriminatory method, while the rhizotron was highly discriminatory and allowed the most traits to be measured but required more than three times the labour of the other methods. The hydroponics was both easy and discriminatory, allowed temporal measurements, but is most likely to suffer from artefacts. Image analysis of rhizotrons compared favourably to manual methods for discriminating between cultivars. Previous observations that cultivars from the <italic>indica</italic> subpopulation have shallower rooting angles than <italic>aus</italic> or <italic>japonica</italic> cultivars were confirmed in the rhizotrons, and <italic>indica</italic> and <italic>temperate japonicas</italic> had lower maximum root lengths in rhizotrons and hydroponics. It is concluded that rhizotrons are the preferred method for root screening, particularly since root angles can be assessed.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Applied Geophysics
Predicting dynamic shear wave slowness from well logs using machine learning methods in the Mishrif Reservoir, Iraq
...Show More Authors

View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Applied Geophysics
Predicting dynamic shear wave slowness from well logs using machine learning methods in the Mishrif Reservoir, Iraq
...Show More Authors

Crossref (7)
Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
A Sociocultural Perspective on Iraqi EFL Learners Reading Comprehension Development
...Show More Authors

 Improving speaking skills of Iraqi EFL students was the main purpose of the current research. Thirty EFL students were selected as the research participants for achieving this aim. All students completed the pretest and then spent the next 25 weeks meeting for 90 minutes each to present their nine lectures, answer difficult questions, and get feedback on their use of language in context. Progressive-tests, posttests and delayed post-tests followed every three courses. The researcher utilized SPSS 22 to anal Analyze the data descriptively and inferentially after doing an ANOVA on repeated measurements. It has been shown that using the ideas of sociocultural theory in the classroom has an important and positive impact on students of

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Sat Mar 28 2020
Journal Name
Iraqi Journal Of Science
A Study on n-Derivation in Prime Near – Rings
...Show More Authors

The main purpose of this paper is to show that zero symmetric prime near-rings, satisfying certain identities on n-derivations, are commutative rings.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
A new Color image Encryption based on multi Chaotic Maps
...Show More Authors

     This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of   1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.   

View Publication Preview PDF
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A Study on Cosmetic Products Marketed in Iraq: Microbiological Aspect
...Show More Authors

Cosmetic products contain variable amounts of nutrients that support microbial growth. Most contaminants   in   cosmetic   products   include bacteria such as Staphylococcus, Pseudomonas, Klebsiella,   Achromobacter   and   Alcaligenes. Contaminated water  is  a  likely  source  of organisms found in cosmetic products. Products such as shampoo, hand and body lotion, facial cleanser,  and liquid soaps were analyzed. In this study, out of 60 cosmetic products analyzed, 26.4% were found to be contaminated.    Most of the contamination was from bacteria and no fungal contamination was detected.  The highest level o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
A study on Soft Pre-Open Sets using γ Operation
...Show More Authors

The concept of strong soft  pre-open set was initiated by Biswas and Parsanann.We utilize this notion to study several characterizations and properties of this set. We investigate the relationships between this set and other types of soft open sets. Moreover, the properties of the strong soft  pre-interior and closure are discussed. Furthermore, we define a new concept by using strong soft  pre-closed that we denote as locally strong soft  pre-closed, in which several results are obtained. We establish a new type of soft pre-open set, namely soft  pre-open. Also, we continue to study pre-  soft open set and discuss the relationships among all these sets. Some counter examples are given to show some relations

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref