This research was carried out to determine the impact of heat shock, electric shock and seeds in soaking nitrous acid mutagen solution on three cultivars of faba beans plant (Zaina, Aguadulce and Local) at the year 2012-2013. Factorial experiment was arranged in randomized complete block design (RCBD) with three replicates were used. The results showed that heat shock lead to early plants of 50% in flowering and an increase in the number of branches/plant and the number of seeds/pod compared to other treatments, whereas the seeds soaked in nitrous acid mutagen solution gave the highest plant height, leaf area index, number of pods/plant, seed weight, seed yield kg/ha, and did not differ significantly with treatment of electric shock in the protein yield(kg/ha). Zaina cultivar was superior over other cultivars in early to 50% flowering, number of branches/plant, number of pods/plant and seed weight, while gave the lowest value in plant height. Significant differences also observed for the interaction between cultivars and treatments. Zaina cultivar with heat shock treatment gave less number of days to 50% flowering, highest number of branches/plant and the number of seeds/pod, either when seeds soaked in nitrous acid mutagen solution given the highest plant height of plant, highest mean of seed weight, seed yield kg/ha and did not differ significantly with local variety in the number of pods/plant trait .
This study was aimed to estimate the influence of Conocarpus erectus L. residues, and some micronutrients on growth and production of potato. This research was conducted at one of the fields of the College of Agricultural Engineering Sciences - University of Baghdad. The experiment was implemented using factorial arrangement (4X3X3) within randomized complete block design with three replicates. Conocarpus fertilizer was represented the first factor with three levels (7.5, 15, 30 ton.ha-1), which symbolized (C2, C3, C4). Mineral fertilizer as recommended dose as a control, which symbolized (C1). The second factor was foliar spraying with three levels of iron (0, 100, 200 mg.L-1), which symbolized (F0, F1, F2). The third factor is fol
... Show MoreThis research involved synthesis of new β-Lactam derivative from Azo compound[4-amino-N-(pyrimidine-2-yl)-3-(pyrimidine-2-yldiazenyl) benzene sulfonamide] (S1) record previously by many steps. Starting conversion the free amino group in an azo comp. to chloro acetamide derivative(S2), then reacted it with urea to give the oxazole ring derivative (S3) that which containing free amino group. The condensation reaction between the amino group and P-bromobenzaldehyde to produce Shiff base (B14). Finally staudinger's cyclo addition reaction go run between the Shiff base derivative (B14) and chloro acetyl chloride in the presence of tri ethyl amine (Et3N) as Base catalyst and dioxane a
... Show MoreA paraffin wax and copper foam matrix were used as a thermal energy storage material in the double passes air solar chimney (SC) collector to get ventilation effect through daytime and after sunset. Air SC collector was installed in the south wall of an insulated test room and tested with different working angles (30o, 45o and 60o). Different SC types were used; single pass, double passes flat plate collector and double pass thermal energy storage box collector (TESB). A computational model based on the finite volume method for transient tw dimensional domains was carried out to describe the heat transfer and storage in the thermal energy storage material of collector. Also, equivalent specific heat metho
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreThe poetic text, being an artistic product, is achieved during the moment of inspiration. However, this inspiration does not come from a vacuum. Rather, it needs a good environment capable of pushing the poetic text to the surface after its formation in the poet's mind, with the images and ideas it contains, expressed in his own language and style. Distinguished, and we must not overlook that language is not just words and meanings, but rather those feelings and emotions that are the essence of creativity (()), including musical, sentimental and imaginative aspects with colors of suggestion and symbols (()), because the poetic language is distinguished from others in that it (Symbols for psychological states are the substance of thought)
... Show MoreThis paper highlights the main features of conjunctive adverbials and their occurrence in English academic prose. It accounts for the semantic roles of conjunctive adverbials, forms in which they are used, their positions within a sentence, and their frequency of occurrence in different registers with special reference to academic prose. It also tries to investigate possible differences in men's and women's use of conjunctive adverbials.
Keyword: conjunctive adverbials, linking adverbials, stance adverbials, circumstance adverbials, academic prose
Audio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some
... Show More