MR Younus, Nasaq Journal, 2022
In order to evaluate the effect of seed size, plant growth regulators and some chemical materials on seed vigour and seedling growth of rice (Oryza sativa L.) an experiment was conducted in 2015 at Laboratories of Agriculture and Marshes College, University of Thi-Qar. Factorial experiment in CRD was used with four replications in two factors. The first factor included three seed sizes (4.6-5.1, 5.2-5.7 and 5.8-6.3 mm). The second factor was seeds soaking treatments (KNO3 6 gl-1, CaCl2 20 gl-1, salicylic acid 20 mg l-1, cytokinin 40 mg l-1, gibberllic acid 400 mg l-1, ascorbic acid 40 mg l-1 and seeds soaked in distilled water). The results showed that the largest seed size influenced significantly and gave the higher averages of germinatio
... Show MoreA laboratory experiment studied the effects of the green tea (Camellia sinensis L.) aqueous extract at concentrations of 10, 20, and 30 ppm on the germination and growth traits of the mung bean (Vigna radiata L.), carried out in 2021 at the Department of Biology, College of Education for Pure Sciences, Ibn Al-Haitham, University of Baghdad, Iraq. The results showed that Camellia sinensis green tea extracts played a vital role by significantly boosting all the examined characteristics compared with the control treatment. The aqueous extract of Green tea at concentrations of 10 and 20 ppm gave the best performance in increasing germination rates, germination speed, plant promoter indicator, and seedling strength compared with the control trea
... Show MoreWe aimed to examine the potential protective effects of Iraqi
Rats were assigned to four groups, six in each group. Group I: rats were administered a daily oral dose of 1 mL/kg/day of distilled water. Group II: rats were intraperitoneally injected with 70 mg/kg DEN once per week for 10 conse
This experiment was conducted to study the effect of injecting hatching eggs into a flock of broiler aged mothers with different concentrations of the alcoholic extract of Moringa oleifera powder on productive performance of broilers during the period of rearing of 35 days. The study included two experiments for a period at 2/10/2021 to 28/11/2021, where eggs were injected into the Mustafa Poultry Hatchery/ Wasit Governorate- Aziziyah District. A 400 hatching eggs of 308 Ross mothers of modern broilers used at age of 48 week, eggs of average weight 66 ± 1 g/egg were collected in same day then stored for two days. A quarter of treatments were randomly distributed with 100 eggs for each treatment.
... Show MoreThe study was conducted from November 2021 to May 2022 at the three study sites within the Baghdad governorate. The study aims to identify the impact of human activities on the Tigris River, so an area free of human activities was chosen and represented the first site. A total of 48 types were diagnosed, 6204 ind/m3 spread over three sites. The following environmental indicators were evaluated: Constancy Index (S), Relative abundance index (Ra), Richness Index (between 17.995 and 23.251), Shannon Weiner Index (0.48-1.25 bit/ind.), Uniformity Index (0.124 -0.323). The study showed that the highest percentage recorded was for the phylum Annileda 34%; and the stability index shows that taxes (Stylaria sp., Aoelosoma sp., Branchinra sowerby, Ch
... Show MoreNecessary and sufficient conditions for the operator equation I AXAX n*, to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More