This research was carried out to determine the impact of heat shock, electric shock and seeds in soaking nitrous acid mutagen solution on three cultivars of faba beans plant (Zaina, Aguadulce and Local) at the year 2012-2013. Factorial experiment was arranged in randomized complete block design (RCBD) with three replicates were used. The results showed that heat shock lead to early plants of 50% in flowering and an increase in the number of branches/plant and the number of seeds/pod compared to other treatments, whereas the seeds soaked in nitrous acid mutagen solution gave the highest plant height, leaf area index, number of pods/plant, seed weight, seed yield kg/ha, and did not differ significantly with treatment of electric shock in the protein yield(kg/ha). Zaina cultivar was superior over other cultivars in early to 50% flowering, number of branches/plant, number of pods/plant and seed weight, while gave the lowest value in plant height. Significant differences also observed for the interaction between cultivars and treatments. Zaina cultivar with heat shock treatment gave less number of days to 50% flowering, highest number of branches/plant and the number of seeds/pod, either when seeds soaked in nitrous acid mutagen solution given the highest plant height of plant, highest mean of seed weight, seed yield kg/ha and did not differ significantly with local variety in the number of pods/plant trait .
Bipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreCopper (Cu) is an essential trace element for the efficient functioning of living organisms. Cu can enter the body in different ways, and when it surpasses the range of biological tolerance, it can have negative consequences. The use of different nanoparticles, especially metal oxide nanoparticles, is increasingly being expanded in the fields of industry and biomedical materials. However, the impact of these nanoparticles on human health is still not completely elucidated. This comparative study was conducted to evaluate the impacts of copper oxide nanoparticles (CuO NPs) and copper sulphate (CuSO4 0.5 (H2O)) on infertility and reproductive function in male albino mice BALB/c. Body weight, the weight of male reproductive organs, mal
... Show MoreSensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreBackground The appropriate disposal of medication is a well-recognized issue that has convened growing recognition in several contexts. Insufficient awareness relating to appropriate methods for the disposal of unneeded medicine may result in notable consequences. The current research was conducted among the public in Iraq with the aim of examining their knowledge, attitude, and practices regarding the proper disposal of unused and expired medicines. Methods The present study used an observational cross-sectional design that was community-based. The data were obtained from using an online questionnaire. The study sample included people of diverse genders, regardless of their race or occupational status. The study mandated that all pa
... Show More