The experiment was conducted to study the effect of leaves extract of Salvia sclarea , Rosmarinus officinalis and Thymus vulgaris with 10% and 30% concentration on germination of seeds and growth of seedlings . The effect of these extracts on infection percentage of seeds decay and surface growth of Rhizoctonia solani . The results showed that the three extracts effected significantly to reduced percentage of seeds germination, acceleration of germination , promoter indicator , infection percentage of seeds decay and surface growth of R. solani especially in 30% concentration .
This study involves the synthesis of a new class of silicon polymers, designated as P1-P7, derived from dichlorodimethylsilane (DCDMS) in combination with various organic compounds (Schiff bases prepared from different amines and appropriate aldehydes or ketones) [I-V] through condensation polymerization. The structures of all monomers and polymers were characterization by FTIR and 1HNMR spectroscopy (for some polymers). The results of thermogravimetric analysis (TGA) and differential scanning calorimetry DSC test show stable thermal behaviour. Polymers with a higher concentration of aromatic rings in their repeating structural units exhibited a higher temperature for weight loss, indicating increased thermal stability. Thermal meas
... Show MoreTheligand4-[5-(2-hydoxy-phenyl)- [1,3,4- thiadiazole-2- ylimino methyl]-1,5-dimethyl -2-phenyl-1,2-dihydro-pyrazol-3-one [HL1] is prepared and characterized. It is reacted with poly(vinyl chloride) (PVC) in THF to form the PVC-L compounds ,PVC-L interacted with ions of transition metals to form PVC-L-MII complexes .All prepared compounds are characterized by FTIR spectroscopy, u.v-visible spectroscopy, C.H.N.S. analysis and some of them by 1HNMR
The refractive indices, nD densities 𝜌, and viscosities of binary mixtures of sulfolane + n -butanol + sec- butanol + iso- butanol + tert – butanol + n-propanol and iso- propanol were measured at 298.15K. Form experimental data, excess molar volum VE , excess molar refractivity ∆nD, excess molar viscosity E and excess molar Gibbs free energy of activation of viscous flow G *E were calculated. From n-propanol – sulfolane and iso- propanol sulfolane mixtures showed negative ∆nD, n-butanol – sulfolane, sec-butanal – sulfolane, iso-butanol – sulfolane and tert- butanol sulfolane , nD was positive over the whole mole fraction rang , while VE , E and G *E show a negative deviation. The
... Show MoreThe study included the extraction of volatile oil from Mentha piperita which was 1.3 % in the leaves and flowers . Volatile oil of the Mentha piperita leaves had special aromatic odour, pale yellow color, slightly pungent taste . The specific gravity and refractive index were (0.9794) and ( 1.464) respectively. The inhibition activity of the Mentha piperita Volatile oil extracts were studied on some pathogenic microorganisms like Staphylococcus aureus, Salmonella typhi, Escherichia coli, Proteus sp, and Klebsiella pneumoniae . The result showed that the volatile oil had an inhibition effect on the growth of all microorganisms, and it gave the higher inhibition effect on the growth of S. aureus in which the inhibition zone reached to 2
... Show MoreBackground: Imprelon® Biostar foils are new alternative tray material that has become increasingly popular because oftheir several advantages. Also, (Duran®) is another type of Biostar foils which is used in splint therapy. This study assessed some mechanical properties of these two types Biostar sheets in comparison with some types of acrylic resins used for construction of trays and splints. Materials and Methods: A total of 150 specimens were prepared, 30 specimens for each test, 10 for each group material in order to assess some mechanical properties of the Imprelon® Biostar foil (dimension stability, surface roughness and shear bond strength of Imprelon® materialto zinc oxide impression material) and compare them to that of the oth
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreAbstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More