Salinity of soil or irrigation water is one of the most important obstacle towards crop production and productivity, especially with the increasing scarcity of fresh water in Iraq and the Arab countries. The impact of salinity will be alleviated with the increasing temperature due to global warming. The objectives of this article was to shed some light on traits more related to salinity stress tolerance in oats, and to identify genetic variation of these traits. A split-plot arrangement experiment with RCBD was applied through 2011-2013 on the farm of Dept. of Field Crops/Coll. of Agric./Univ. of Baghdad. The oats cultivars; Hamel, Pimula and Genzania were set in sub-plots, whereas water quality was set in main-plots. Water quality had two treatments, fresh water (1.5 ds.m-1 ) and saline irrigation water (6.0 ds.m-1 ). The results revealed that Genzania cv. oat yielded the other two cultivars. This cultivar elapsed 121 d to flowering, 152 d to maturity, and gave 379 racemes.m-2 , 47 kernel. raceme-1 , 32.1% harvest index, 17740 kernel.m-2 and 5.3 t.ha-1 grain yield across both years. Salinity of irrigation water did not affect any of plant height, days to flowering and maturity, stems.m-2 , racemes.m-2 , dry matter yield, kernel filling period, kernel growth rate, or kernel weight. On contrary, water salinity reduced each of crop growth rate, fertility (kernel/raceme), kernel.m-2 , and grain yield. Each one ds.m-1 above 1.5 ds.m-1 reduced grain yield by 3.8%. Highest traits in genetic/environmental variance were kernel weight, and number of stems.m-2 . However, this ratio was similar in traits of harvest index, kernel filling period, and days to flowering and maturity. There was no absolute relationship between trait genetic variance and its response to salinity. Kernel weight and number of stems.m-2 were the best traits to select for salt tolerance in oats. It was recommended to study flowering syndrome including fertility under salinity stress. Crop growth rate should be determined for each of vegetative and reproductive phases of that crop.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreAbstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col
... Show MoreSurvival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreThe Dynamic Load Factor (DLF) is defined as the ratio between the maximum dynamic and static responses in terms of stress, strain, deflection, reaction, etc. DLF adopted by different design codes is based on parameters such as bridge span length, traffic load models, and bridge natural frequency. During the last decades, a lot of researches have been made to study the DLF of simply supported bridges due to vehicle loading. On the other hand, fewer works have been reported on continuous bridges especially with skew supports. This paper focuses on the investigation of the DLF for a highly skewed steel I-girder bridge, namely the US13 Bridge in Delaware State, USA. Field testing under various load passes of a weighed load vehicle was u
... Show MoreA legal discourse in the Qur’an and Sunnah is almost devoid of the use of one of the general formulas, and due to its frequent rotation in the tongue of the legislator, the formulas may overlap their members in apparently contradictory provisions, which makes the individual from the general members appear to the beholder to be covered by two contradictory provisions, and this research came to present what might happen to him The legal text interpreter of weighting between the two opposing texts is the strength of the generality that is established by the generality formula, so the two strongest formulas in the inclusion of its members outweigh the weaker of them and precede them, and the research decided that the formulas vary
... Show MoreThe objective review is to inspect the involvement of Interleukin-6 (IL-6) in rheumatoid arthritis (RA) and to highlight the role of IL-6 and its variants in the pathogenesis of RA and response to anti-IL-6 agents. Several genetic and environmental risk factors and infectious agents contributed to the development of RA. Interleukin-6 is engaged in self-targeted immunity by modifying the equilibrium between T regulatory (T-reg) and T helper-17 (Th-17) cells. The evidences reported that IL-6 parti
Genus Eucalyptus belongs to the family Myrtaceae that consists of more than 700 species, various hybrids and varieties. The majorly distributed species that are grown in Iraq are Eucalyptus alba, E. macarthurii, E. siderophloia and E. camaldulensis, E. tereticornis, E. vicina. Most Eucalyptus species are highly dependent on rainfall, and this is challenged by climatic changes owing to global warming making it difficult to effectively match the availability of mature trees and the market demand, especially for use as power transmission poles. With the widespread availability of other naturally occurring Eucalyptus species, it has become important to determine the genetic diversity and to analyze the phenotypic tra
... Show More