Preferred Language
Articles
/
bsj-8037
Control Pepper Fusarium Wilting by biocontrol agent Trichoderma harzianum and Chelated Iron Fe-EDDHA
...Show More Authors

Sweet pepper (Capsicum annuum L.) is an economically important vegetable crop. Wilt disease caused by Fusarium oxysporum f. sp. capsici is a specific pathogen that affects the pepper. Four isolates of F. oxysporum f. sp. capsici Fo3, Fo6, Fo7 and Fo8 were obtained from diseased pepper plants that were collected from different pepper fields in Baghdad. Fo6 isolate that has high pathogenicity to pepper seeds, Trichoderma harzianum (Th) was tested in vitro against F. oxysporum f. sp. capsici showed a high inhibition rate for the isolate Fo6, the concentration of chelated iron Fe-EDDHA 0.5% reduced the radial growth of Fo6 while did not affect the growth of Th. In pots experiment, the treatment Fo6+Th+Fe showed a significant reduction in the incidence and severity of root rot and wilt diseases. The treatment Th+Fe achieved a highly significant increase in fresh and dry root and vegetative weight 63.36, 130.56, 4.55 and 10.26g respectively, compared with control (without pathogenic) reaching 11.10, 54.83, 1.30 and 3.70g respectively. Moreover, in greenhouse the treatment Fo6+Th+Fe has reduced the incidence and severity of disease 3.33 and 1.67% respectively, and the treatment Th+Fe gave an increase in the total chlorophyll content 104 SPAD compared with the control 70.4 SPAD.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The reality and fundamentals of the poultry industry and its implications on the prices of eggs and chickens in Iraq for the period from 2000 to 2009 (analytical study)
...Show More Authors

Despite all the possibilities held by Iraq for the production of poultry , but there is low and clear in the level of production and a rise in costs and a decline in per capita consumption is due to a number of reasons, including poor investment , stop government subsides , dumping policies , market Bolmottagat imported , the contribution of the merchant squandering of national capacity , weak base material for the growth of this sector , the security situation and the crisis of energy and others .

Despite all this research has shown that there are great investment opportunities in this very sector of the market size and absorptive capacity of his and the growth of per capita income  and level of cul

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Pre-Processing and Surface Reconstruction of Points Cloud Based on Chord Angle Algorithm Technique
...Show More Authors

Abstract

Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built t

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Impact Of Adopting The Social Responsibility On Marketing Performance An Applied Study on NAFTAL Company
...Show More Authors

This research paper aims at studying the effect of adopting the corporate social responsibility on marketing performance indicators, where the study adopted the descriptive method for theoretical concepts, in addition to the statistical approach by using the SPSS v25 program to analyze the questionnaire and test the hypotheses of the study. The results showed that there is a positive correlation between social responsibility and marketing performance indicators, and the study found that it is better for NAFTAL Company to mix the environmental and social responsibilities in order to improve its marketing performance. Also, the study recommended that Naftal should adopt the four responsibilities equally, correctly and make its work

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Educational And Psychological Researches
Installing Quality of Gratitude in Children from an Islamic Educational Perspective
...Show More Authors

The study aimed to identify how to raise grateful children from an Islamic educational perspective. For that objective to be achieved, the researcher used both of deductive and descriptive approaches using the method of documentary research. The study's results show that children are the real wealth of the community and the foundation of cultural building; therefore, paying attention their raising is a responsibility that must be shared by everyone; gratitude is part parcel of the Islamic doctrine, which is one of the greatest virtues; the virtue of gratitude is the attitude of the believers which in turn strengthens the bonds and expands the network of positive social relationships; It is also considered a cultural significance

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 04 2019
Journal Name
Journal Of Planner And Development
(الاستدامة في الحصول على الخدمات الحضرية (حالة تطبيقية على مدينة النجف الأشرف
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Jan 26 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
العوامل المؤثرة على اختيار موقع المشروع الصناعي وأثر ذلك على تلوث البيئة
...Show More Authors

There is no doubt though all endemic industrial must be accompanied by environmental contamination problem that is closely linked increased industrial activity on the one hand and increase the size of the problem put this industrial waste on the other, and therefore the risk to natural resources and ecosystems as a result of the presence of development projects (especially industrial ones) so it was There must be a sound footing for the sitting of industrial zones and see how their commitment to the appropriate conditions to preserve the environment and enact strict laws to achieve this and prepared well prepared to avoid the numerous errors at the social, economic and technical, environmental and health.

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Effect of Environmental Factors on the Accuracy of a Quality Inspection System Based on Transfer Learning
...Show More Authors

In this research, a study is introduced on the effect of several environmental factors on the performance of an already constructed quality inspection system, which was designed using a transfer learning approach based on convolutional neural networks. The system comprised two sets of layers, transferred layers set from an already trained model (DenseNet121) and a custom classification layers set. It was designed to discriminate between damaged and undamaged helical gears according to the configuration of the gear regardless to its dimensions, and the model showed good performance discriminating between the two products at ideal conditions of high-resolution images.

So, this study aimed at testing the system performance at poor s

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Facial Emotion Images Recognition Based On Binarized Genetic Algorithm-Random Forest
...Show More Authors

Most recognition system of human facial emotions are assessed solely on accuracy, even if other performance criteria are also thought to be important in the evaluation process such as sensitivity, precision, F-measure, and G-mean. Moreover, the most common problem that must be resolved in face emotion recognition systems is the feature extraction methods, which is comparable to traditional manual feature extraction methods. This traditional method is not able to extract features efficiently. In other words, there are redundant amount of features which are considered not significant, which affect the classification performance. In this work, a new system to recognize human facial emotions from images is proposed. The HOG (Histograms of Or

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref