The seed propagation is the predominant method of Echinacea propagation, which has been criticized for its time-consuming control over the separation factor and the uncertainty of pathogen-free plants produced by this method. The technology of tissue culture has provided multiple opportunities for the production of secondary metabolites continuously without being restricted to a specific season, due to the possibility of controlling the environmental conditions and the components of the nutrient medium needed by the plant. This study was conducted to investigate the effects of salicylic acid as elicitor and tyrosine as precursor on propagation and some secondary compounds production in coneflower in vitro. The result showed the superiority of 2 mg / liter SA over the other treatments, which gave the highest average number of branches formed reaching 33.6 branches / plant part, number of leaves 33.6 leaves/vegetable part, fresh 1.067g and dry 0.058g weights as well as echinacoside concentration of 291.3427 μg / g DW. However, the treatment 100 mg/l tyrosine gave a maximum of average number of branches 11.80 branches / plant part, number of leaves 11.80 leaves/vegetable part, fresh and dry weight 0.152 and 0.023 g respectively. Concerning echinacoside value, its maximum 318.5203 μg / g DW was recorded with 150 mg/l tyrosine. From this study, we concluded that caffeic acid derivatives such as echinacosides are one of the main phytochemical components of Echinacea extracts. The system of cell culture is a tool for the large-scale, year-round culture of plant cells, so it is a continuous source for the production of active compounds
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreLet G be a graph with p vertices and q edges and be an injective function, where k is a positive integer. If the induced edge labeling defined by for each is a bijection, then the labeling f is called an odd Fibonacci edge irregular labeling of G. A graph which admits an odd Fibonacci edge irregular labeling is called an odd Fibonacci edge irregular graph. The odd Fibonacci edge irregularity strength ofes(G) is the minimum k for which G admits an odd Fibonacci edge irregular labeling. In this paper, the odd Fibonacci edge irregularity strength for some subdivision graphs and graphs obtained from vertex identification is determined.
The ground state properties including the density distributions of the neutrons, protons and matter as well as the corresponding root mean square (rms) radii of proton-rich halo candidates 8B, 12N, 23Al and 27P have been studied by the single particle Bear– Hodgson (BH) wave functions with the two-body model of (core+p). It is found that the rms radii of these proton-rich nuclei are reproduced well by this model and the radial wave functions describe the long tail of the proton and matter density distributions. These results indicate that this model achieves a suitable description of the possible halo structure. The plane wave Born approximation (PWBA) has been used to compute the elastic charge form factors.
The research aims to find approximate solutions for two dimensions Fredholm linear integral equation. Using the two-variables of the Bernstein polynomials we find a solution to the approximate linear integral equation of the type two dimensions. Two examples have been discussed in detail.
In this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreAbstract
The research study about the empowerment as an independent variable, in which details include (training and improvement, incentives, information sharing, trust, and delegation), has also focused on the performance of the service organization as a dependent variable in all dimensions which include (improve work efficiency, building the core competencies, focus on the beneficiary of the service, increasing the feeling of satisfaction of the employees, and the organizational support commitment). The research has been based on the opinions of a chosen sample of 75 service officers of the Ministry of Interior who work at the General Directorate of Traffic. The research problem has been identified by t
... Show MoreMetadiscourse markers are means for organizing a writer’s information and create a connection with her/his readers. When students write, they usually focus on one type of these markers that is the interactive markers and belittling the use of the other type which is the interactional markers. That is to say, they emphasize on presenting and organizing their information only. Therefore, this study is conducted to bridge this gap. The researchers have selected 18 thesis abstracts. Nine of them are written by Iraqi students of English and the rest by American students. The aims of the study are to examine the types and sub-types of metadiscourse markers used by American and Iraqi students; investigate comparatively the impact of the metad
... Show MoreThis paper addresses the new coloring in the concept of dystopian society as represented by the positive role of one of the characters vs. the passive role of the government and its mutual effect on the people of the society. In addition, it describes how all men in the dystopian society victimize and degrade the other through unlawful acts, like: stealing, rape, and fear, which are the lowest points in a moral decay. However, it offers hope by illustrating a positive sense, as exemplified by the doctor's wife out of Saramago's optimistic view that men may be descended from good women. Accordingly, the paper aims to examine the effect of the government’s role in the lives of the people who have later turned into blind in a dystopi
... Show More