74 fanners were randomily selected from the Lc:ital. of 406 fanners using the Modern Irrigation System up to November , 2000 , for the purpose of wide adoptation of such system. Rcsults indicated according to the data which has been obtained and statistically analysed by the statistical package for the Social Sciences (SPSS) program showed that the majority of the farmers adopted this new system of irrigation due to the increase in the yield up to 5" .
Steps were taken to obtain the Kojic acid crystals from local fungal isolation A. flavus WJF81 by separating the fermentation products from the fungus mycelium from the production plant at the centrifuge at a speed of 5000 cycles for 10 minutes. The extraction was followed by ethyl acetate then supernatant concentrate by using rotary evaporator, and dried with heat oven 37ºC. Long, yellowish, pristine acid crystals were obtained that examined the optical microscope with a magnification force of 10x and 40x. The melting point of kojic acid was determined between 152.9-153.5 °C Results of the diagnosis of Kojic acid by applying High pressure liquid chromatography HPLC technique showed that the acid was at one peak, which was close to the
... Show MoreBackground: Red clover oil (Trifolium pratense) has isoflavones bunches which have estrogen-like exercises and may establish an option in contrast to hormone substitution treatment. The present study investigated the impact of Red clover oil on bone healing in rats by histomorphometric study. Materials and Methods: Intra bony defect was performed in right femur of thirty six healthy male albino rats. Then these rats were randomly divided into three groups (12 rats each): one control and 2 experimental groups. For control, the bony defect was left for normal healing; for the experimental (S) group, the defect was treated with hemostatic absorbable gelatin sponge; and for experimental (RS) group, the bony defect was treated with 0.2 ml red
... Show MoreAbstract
This study aims at identifying the impact of the application of IFRS 15 "Revenue from contracts with customers on the quality of financial reporting, through application to faculty members in the accounting departments of Iraqi universities and auditors. The problem of the study was the multiplicity of accounting rules and standards Which deals with the issues of revenue recognition , as well as the lack of consistency of most of them with the common framework of financial accounting, which results in low quality of financial reporting in the current financial statements, where the formulation of one hypothesis was the lack of relationship of significant significance The application of IFRS 15 "Recognition of rev
... Show Moreهدفت الدراسة الحالية الى التعرف ما اذا كان هناك تقبل اجتماعي للتلاميذ بطيئي من قبل اقرانهم العاديين؟ وكذلك معرفة ما اذا كان هناك فروق ذات دلالة في التقبل الاجتماعي بين افراد عينة الدراسة على وفق المتغيرات الاتية:
أ- العمر (9-13)
ب- الجنس (ذكور –اناث)
ج- المرحلة الدراسية
د- الحالة الاقتصادية (جيدة –متوسطة –جيدة جدا)
ولغرض تحقيق اه
... Show MoreMixed ligand of Co and Ni (II) complexes were prepared from [5-(p-nitrophenyl)-4/-phenyl-1,2,4-triazole-3-dithiocarbamato hydrazide](TRZ.DTC) as primary ligand and 2,2'-bipyridyl (bipy) as a co-ligand with metal salts. These complexes were analytically and spectroscopically characterized in solid state by elemental analyses, flame atomic absorption, magnetic susceptibility and molar conductance measurements, as well as by UV–Vis and FTIR spectroscopy. Infrared, ultra violet spectra reveal a bidentate coordination of the two ligands with metal ions 1:1:1 mole ratio. Room temperature magnetic moments and solid reflectance spectra data indicate paramagnetic complexes with five-coordinate square pyramidal geometry for nickel (II) comple
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreABSTRACT— In primary teeth, root canal treatment is a time consuming and challenging procedure, particularly during the most important step in endodontic treatment which is the preparation of the canal. Pulpectomy is the treatment of choice in all the necrotic primary teeth. For better treatment protocol, advancing technology brought the rotary system to reduce the manual dexterity and improve the quality of treatment for pulpectomy. This study aimed to compare and assess the efficacy of cleaning and the time required for the instrumentation during the preparation of root canals of the primary molars using the rotary and the manual (conventional) systems. Thirty root canals of primary teeth were selected. These teeth submitted to a
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show More