The research was conducted in the Department of Horticulture College of Agriculture, University of Baghdad for two seasons 1999-2000 on cultivars pomegranate Salimi and narrators seedless to study the effect of growth regulators in the amount of winning and some qualities included experience 9 transactions and three replicates per treatment used experience global Dhant design sectors full randomization carried out transactions in the two datesfirst at the onset of flowering and the second after 70 m results showed superior product Salimi Rawa
Exposing the dorsal superficial skin of rats to partial-depth burn leads to bacterial and microbes Invasion. Topical treatment is required in most superficial burn cases Moist exposed burn ointment (MEBO) protects wounds from infection and enhances healing without any harmful effects of purified chemicals is caused. The topical using of HA gel in rat models with full and partial thickness surgical wounds shows enhancement in wound repair. In this study, we compared the healing efficacy of topical use of hyaluronic acid gel products with MEBO as standard management in rats that were exposed to a partial-thickness burn. The experiment included twenty-four (24) adult albino rats of male sex with weight (150-220 gm) of 3 months’ age divided i
... Show MoreBackground and Aim: Canine parvovirus 2 (CPV-2) is a highly contagious virus that infects wild and domestic canines. Despite the use of a routine vaccination protocol, it is endemic in Iraq. The genetic drift of CPV-2 is a major issue worldwide because it abrogates virus control. In Iraq, there is a knowledge gap regarding the genetic sequences of asymptomatic and symptomatic CPV-2 cases. Therefore, this study aimed to perform a genetic analysis of viral capsid protein 1 (VP1) and viral capsid protein 2 (VP2), two major capsid-encoding genes, to demonstrate the possible role of certain mutations in triggering infection. Materials and Methods: Symptomatic and asymptomatic cases (n = 100/each) were tested by a polymerase chain reacti
... Show MoreThe Nuclear structure of 110-116Cd isotopes was studied theoretically in the framework of the interacting boson model of IBM-l and IBM-2. The properties of the lowest mixed symmetry states such as the 1+, 2+ and 3+ levels produced by the IBM-2 model in the vibrational-limit U(5) of Cd - isotopes are studied in details. This analysis shows that the character of mixed symmetry of 2+ is shared between and states in 110-114Cd – isotopes, the large shar goes to s, while in isotope, the state is declared as a mixed symmetry state without sharing. This identification is confirmed by the percentage of F-spin contribution. The electromagnetic properties of E2 and Ml operators were investigated and the results were analyzed. Various
... Show MoreThe study included general survey of some districts of Iraq in order to determinate new distribution areas for 33 species of the genus salvia L. ,new collections obtained , new locations for many species recorded. Observed specimens in most Iraqi herbaria were studies and identified. ,the flowering period were also studied
The study included general survey of some districts of Iraq in order to determinate new distribution areas for 33 species of the genus salvia L. ,new collections obtained , new locations for many species recorded. Observed specimens in most Iraqi herbaria were studies and identified. ,the flowering period were also studied
The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use
... Show More
