Preferred Language
Articles
/
QBhrdpQBVTCNdQwCbBk7
Detection of Genetic Relationship Between Eucalyptus Species in Iraq
...Show More Authors
Abstract<p>Environmental factors that damage plant cells by dehydrating them, such cold, drought, and high salinity, are the most common environmental stresses that have an impact on plant growth, development, and productivity in cultivated regions around the world. Several types of plants have several drought, salinity, and cold inducible genes that make them tolerant to environmental challenges. The purpose of this study was to investigate several species in <italic>Eucalyptus</italic> plants and determined the evolutionary descent between different species of <italic>Eucalyptus</italic>. Samples from plants were used to extract genomic DNA. After sequence methods with phylogenetic analysis using MEGA6, program. According to our findings, demonstrate that the sequences of several spp. were submitted to Gene Bank: <italic>E. alba</italic> (OP696606.1), <italic>E. bortryoides</italic> (OP696601.1), <italic>E. camaldulensis</italic> (OP696607.1), <italic>E. curtisii</italic> (OP696596.1), <italic>E. delegatensis</italic> (OP696604.1), <italic>E. erythrocorys</italic> (OP696599.1), <italic>E. globoidea</italic> (OP696597.1), <italic>E. leucoxylon</italic> (OP696598.1), <italic>E. macarthurii</italic> (OP696610.1), <italic>E. nicholii</italic> (OP696602.1), <italic>E. pauciflora</italic> (OP696603.1), <italic>E. siderophloia</italic> (OP696605.1), <italic>E. tereticornis</italic> (OP696611.1), and <italic>E. vicina</italic> (OP696608.1). These genes can be used to create crop plants that are resistant to drought.</p>
Scopus Crossref
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The interactive role of high performance work systems in the relationship between high Involvement management practices and strategic Entrepreneurship / case study at Diyala State Company
...Show More Authors

The research aims to form a clear theoretical philosophy and perceptions about strategic Entrepreneurship through the relationship between high Involvement management practices, the basis in creating that leadership and high-performance work systems as a support tool in achieving them according to the proposals (Hitt et al, 2011), in an attempt to generalize theoretical philosophy and put forward how to apply it within The Iraqi environment, and on this basis the problem of the current research was launched to bridge the knowledge gap between the previous proposals and the possibility of their application, aiming to identify the practices of high Involvement management and the possibility of high-performance work systems and thei

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Text Document
...Show More Authors

Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Color Image
...Show More Authors

In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Genetic study of Salmonella spp. Producting Betalatimase (ESBLs)
...Show More Authors

Ten isolates were collected from different clinical sources from laboratory in medicine century . These isolates were belonging to the genus Salmonella depending on morphological and biochemical tests . The antibiotic scussptibility tests against 10 antibiotics were examined , and it was found that the 60% isolates have multiple resistant to antibiotic ,(70%) of isolates were resistant to ampicillin,(50%) were resistant to augmentin ,(40%) were resistant to ceftriaxone ,(20%) were resistant to cefotaxime and (10%) were resistant to ciprofloxacin and tetracycline while all isolates showed sensitivity to piperacillin, imipenem, amikacin and erythromycin .The ability of Salmonela isolates to produce ?-lactamase enzymes were tested usin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (14)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Determination Optimum Inventory Level for Material Using Genetic Algorithm
...Show More Authors

The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period.             &nb

... Show More
View Publication Preview PDF
Publication Date
Sun May 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Use of Bark Water Extracts of Eucalyptus camaldulensis to Control the Snail Host Bulinus truncates of Urinary Schistosomiasis
...Show More Authors

  The present study is a contribution to determine the effect of bark water extracts of the common trees of Eucalyptus camaldulensis to control the snail intermediate host (Bulinus truncatus) of urinary Schistosomiasis in Iraq. It was found that the lethal concentrations of bark phytochemicals to this snail were ranging from 10gm/l to 50gm/l.The effect of bark extracts was very remarkable during the first 24 hours.

View Publication Preview PDF
Publication Date
Thu Sep 01 2016
Journal Name
Arabian Journal Of Geosciences
Assessment of interconnection between surface water and groundwater in Sawa Lake area, southern Iraq, using stable isotope technique
...Show More Authors

View Publication
Scopus (26)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The Local Food Crisis in Iraq Between Thoughts of the Malthusian Theory and the Agricultural Section Regression Reality
...Show More Authors

Most countries in the world particularly developing countries, including Iraq,  facing  extremely dangerous problem with social and political dimensions, which is the emergence of the food crisis  problem ,the decrease in domestic food production in Iraq isn't meet the needs of its population food, due to the fact that the agricultural sector suffers from multiple natural ,economic  and human   problems .It is still below the level required to meet the needs of the population  of  food ,since food  at the forefront of priorities needed by the human . This represents indispensable  basic  necessity , so the responsibility of its availability permanently  in appropriate&nb

... Show More
View Publication Preview PDF
Crossref