The study was conducted to investigate the effect of salinity of irrigation water on seeds quality and seedling growth characters for three oat cultivars (Shifaa, Hamel and Pimula) . It was carried oat in seed technology laboratory, field crops department, College of Agriculture, Baghdad University of Aljadiriya for period of tow years. Seeds of three oat cultivars (Shifaa, Hamel and Pimula) taken from a field experiment conducted during 2014-2015 and 2015-2016 irrigated with three salinity water levels (3, 6 and 9 dS.m-1 ) in addition to river water with salinity level of 1.164 dS.m-1 as control. Seeds were tested in laboratory experiments to estimate their quality, and completely randomized design with three replicates was used. Statistical analysis results for both seasons showed a significant effect of salinity stress with increasing salinity concentration in all studied traits, where mean values of studied traits decreased significantly at salinity level of 6 dS.m-1 and the effect of salinity level (9 dS.m-1 ) recorded the lowest means of germination percentage (71.4% and 71.1%), germination speed (3.57 and 3.49 seedling.day-1 ), radicle length (5.12 and 7.19 cm), plumule length (7.87 and 11.7 cm), radicle dry weight (2.91 and 2.55 mg), plumule dry weight (8.92 and 9.02 mg) and seedling vigor (838 and 820 mg) for both seasons, respectively. No significant differences recorded between water salinity level of 3 dS.m-1 and river water in all studied traits. Cultivars Shifaa and Pimula were superior in traits of radicle and plumule length, whereas cultivar Hamel was superior in traits of radicle dry weight (8.50 and 9.34 mg), plumule dry weight (17.38 and 17.68 mg) and seedling vigor (2287 and 2305 mg) for both seasons, respectively. So it is concluded that the effect of salinity stress is not restricted on plant growth and yield only, because it also affects the quality of produced seeds. Consequently, we recommend using irrigation water with salinity level of less than 6 dS.m-1 for seeds production.
Abstract
Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al
... Show MoreAbstract
The present paper attempts to detect the level of (COVID-19) pandemic panic attacks among university students, according to gender and stage variables.
To achieve this objective, the present paper adopts the scale set up by (Fathallah et al., 2021), which has been applied electronically to a previous cross-cultural sample consisting of (2285) participants from Arab countries, including Iraq. The scale includes, in its final form, (69) optional items distributed on (6) dimensions: physical symptoms (13) items, psychological and emotional symptoms (12) items, cognitive and mental symptoms (11) items, social symptoms (8) items, general symptoms (13) items and daily living practices (12) items
... Show MoreDespite efforts to contain and manage the SARS-CoV-2 outbreak which was declared a public health emergency of international concern in January 2020 by the World Health Organization (WHO), the COVID-19 pandemic still remains a major global challenge. Patients who display the classical symptoms of the infection are easily identified, tested, isolated and monitored. However, many cases of infected asymptomatic patients have been documented. These patients are not easily identified even though many evidences suggest that they can spread the virus to others. How and why these COVID-19 asymptomatic presentations occur remain unclear. The many theories and views are conjectural, and supporting evidences are still needed. In this review, we
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreAcid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreSoil water retention curves (SWRCs) are crucial for characterizing soil moisture dynamics and are particularly relevant in the context of irrigation management. A study was carried out to obtain the SWRC, inflection point, S index, pore size distribution curve, macro porosity, and air capacity from samples submitted to saturation and re-saturation processes. Five different-texture disturbed soil samples Sandy Loam, Loam, Sandy Clay Loam, Silt Loam, and Clay were collected. After obtaining SWRC, each air-dried soil samples were submitted to particle size distribution and clay dispersed in water analyses to verify the soil lost clay. The experimental design was completely randomized with three replications using two processes of SWRC (saturat
... Show More