This experiment was conducted in the orchard of the Department of Horticulture,college of Agriculture,Baghdad University during the growing season of 2007 To study the effects of spray with three concentration of cultar(0,500,1000 mg.L-1) ,tow concentration of K2SO4(0,5g.L-1), and salinity of irrigation water with three concentration (1,2,3dS.m-1) on some characteristics of vegetative growth of two cultivars of apricot trees (Labib1 and Zienni).The age of trees was four years .The tree grafted on original of seed apricot . Afactorial trail was carry out according to randomized complete block design with arrangement of split-split with three replications. Salinity of irrigation water took main plot, potassium took sub plot and cultar took sub sub plot, cultar significantly reduced the plant height and leaves area at apercentage of( 26.77 , 24.1 and 12.33 , 15.95%) respectively in labib and zienny cultivars respectively. Weheras significantly increased carbohydrates at apercentage of (4.44,4.35%) in labib and zienny cultivars respectively. K2SO4 was significantly increased the plant hight, leaves area and carbohydrates at apercentage of (15.66,12.82, 10.36,9.10 and 2.61,2.15%) respectively in labib and zienny cultivars respectively. Irrigation water salinity was decreased the plant hight, leaves area and carbohydrates at apercentage of (25.69, 29.17,15.29,16.29 and 24.31,30.65%) respectively in labib and zienny cultivars respectively.
Objectives: The study aims at finding the effectiveness of dietary habits on urolithiatic patients at Urinary Units
in Baghdad Teaching Hospitals.
Methodology: A quantitative descriptive study was conducted to identify the effectiveness of dietary habits on
(100) of urolithiatic patients in Urinary Units at Baghdad Teaching Hospitals starting from May 2011 to Sep.
2012.Data were collected through the use of constructed check list of the questionnaire format, which
consists of two parts: - The first part: is related to the patient's demographic variables ; the second part: is
constructed to serve the purpose of the study (effectiveness of the dietary habits). The total number of items
of the questionnaire is (69) item
Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThis paper is concerned with preliminary test double stage shrinkage estimators to estimate the variance (s2) of normal distribution when a prior estimate of the actual value (s2) is a available when the mean is unknown , using specifying shrinkage weight factors y(×) in addition to pre-test region (R).
Expressions for the Bias, Mean squared error [MSE (×)], Relative Efficiency [R.EFF (×)], Expected sample size [E(n/s2)] and percentage of overall sample saved of proposed estimator were derived. Numerical results (using MathCAD program) and conclusions are drawn about selection of different constants including in the me
... Show MoreThis study sought to give a general picture of the organizations and formations of the ground forces of the Abbasid army in its first era, in preparation and armament and continuous development of the mechanisms to help maintain the moral and spiritual morale in the fighting.
Therefore, the caliphs' interest in building the army, organizing it, arming it, choosing competent leaders, and providing them with various weapons in terms of production and storage, as well as taking care of fortifying the cities and gaps in determination and determination, and embarked on construction and restoration, where amazing speed and acted according to the circumstances. During the first Abbasid era, there were significant developments in the military
In this research, porous silicon (PS) prepared by anodization etching on surface of single crystalline p-type Si wafer, then Gold nanoparticle (AuNPs) prepared by pulsed laser ablation in liquid. NPs deposited on PS layer by drop casting. The morphology of PS, AuNPs and AuNPs/PS samples were examined by AFM. The crystallization of this sample was characterized by X-ray diffraction (XRD). The electrical properties and sensitivity to CO2 gas were investigated to Al/AuNPs/PS/c-Si/Al, we found that AuNPs plays crucial role to enhance this properties.
This paper aims at studying the illocutionary speech acts: direct and indirect to show the most dominant ones in a presidential speech delivered by the USA president. The speech is about the most critical health issue in the world, COVID-19 outbreak. A descriptive qualitative study was conducted by observing the first speech delivered by president Trump concerning coronavirus outbreak and surveying the illocutionary acts: directive, declarative, commissive, expressive, and representative. Searle's (1985) classification of illocutionary speech acts is adopted in the analysis.
What are the main types of the illocutionary speech acts performed by Trump in his speech?; Why does
... Show MoreIn this paper, we will show that the Modified SP iteration can be used to approximate fixed point of contraction mappings under certain condition. Also, we show that this iteration method is faster than Mann, Ishikawa, Noor, SP, CR, Karahan iteration methods. Furthermore, by using the same condition, we shown that the Picard S- iteration method converges faster than Modified SP iteration and hence also faster than all Mann, Ishikawa, Noor, SP, CR, Karahan iteration methods. Finally, a data dependence result is proven for fixed point of contraction mappings with the help of the Modified SP iteration process.
Governmental establishments are maintaining historical data for job applicants for future analysis of predication, improvement of benefits, profits, and development of organizations and institutions. In e-government, a decision can be made about job seekers after mining in their information that will lead to a beneficial insight. This paper proposes the development and implementation of an applicant's appropriate job prediction system to suit his or her skills using web content classification algorithms (Logit Boost, j48, PART, Hoeffding Tree, Naive Bayes). Furthermore, the results of the classification algorithms are compared based on data sets called "job classification data" sets. Experimental results indicate
... Show MoreThis study was conducted to evaluate the effects of black tea on Pseudomonas
aeruginosa isolated from eye infection. One hundred samples (corneal scrapings)
were obtained. Approximately, 77% of the cases were due to contact lens wear
followed by 15 % trauma and 8% with unknown history. The isolates identified as
P. aeruginosa were 30% (23/77 CL) and 25% (2/8 Unknown). On the other hand,
the Kirby-Bauer antibiotic sensitivity assay showed that 100% of the isolates were
sensitive to Neomycin, Gentamicin and Amikacin. While 91.6% were sensitive to
Carbenicillin and Ceftriaxone; 66.6% were sensitive to Cefotaxime and 0% were
sensitive to Tertacycline. Only two isolates were found to be multidrug resistant.
Screenin
Because of the rapid development and use of the Internet as a communication media emerged to need a high level of security during data transmission and one of these ways is "Steganography". This paper reviews the Least Signification Bit steganography used for embedding text file with related image in gray-scale image. As well as we discuss the bit plane which is divided into eight different images when combination them we get the actual image. The findings of the research was the stego-image is indistinguishable to the naked eye from the original cover image when the value of bit less than four Thus we get to the goal is to cover up the existence of a connection or hidden data. The Peak to Signal Noise Ratio(PSNR) and Mean Square Error (
... Show More