The genetic diversity was studied in sixteen barley Hordeum vulgar L. species cultivated in Iraq , which are differ in their ability to drought stress tolerance by using random amplified polymorphic DNA polymerase chain reaction (RAPD - PCR ) .Barley species was evaluated to drought stress after treatment the plant seedling at germination stages to different concentration of polyethylene glycol (PEDG6000) . The results showed that the Broaq and Arefat species have the highest tolerance to drought stress in contrast the rest of Barly species like Alkhair, Alwarkaa, Ebaa99, Shoaa, Alrafidain,Sameer Rehana 3 , forat9 , jazeral ,and ebaa7 revealed sensitivity to drought stress . The primes which used RAPD technique
... Show MoreThis study was carried out to study effect of magnetic water ( M0 and M) and different concentrations of coconut extract in Fragaria x ananassa (Duch) C.V Festival. The results showed significant differences in the plants treated with magnetic water ( 0.12 Tesla) and different concentrations of coconut extract C1 (0%), C2 (2.5%), C3 (5%), C4 (7.5%) and C5 (10%) in vegetative parameters as in leaf area and chlorophyll in treatment M0C3 was (53.72 Dcm2, 50.00), respectively, highest leaf number and plant dry weight in MC4 (12.77,14.22 gm), respectively. Results recorded significant differences in fruit parameters such as weight in MC1 (18.97 gm). The maximum fruit number was in MC3 (110), the greatest fruit size was in MC4 (15.78 cm3) and the
... Show MoreBackground: Bacterial DNA released upon bacterial autolysis or killed by antibiotics, hence, many inflammatogenic reactions will be established leading to serious tissue damage. Aim: the present work aimed to elucidate the histopathological changes caused by prokaryotic (bacterial) DNA and eukaryotic (candidal) DNA. Materials and methods: twenty one Staphylococcus aureus and 36 Candida albicans isolates were isolated from UTI patients. Viable cells and DNA of the highest antibiotic sensitive isolates were injected, intraurethraly, in mice. Results were evaluated via histopathological examination. Results: Mildest reactions were obtained from mice challenged with viable C. albicans compared with those challenged with viable S. aureus. Dos
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe current research aims at knowing the impact of the mind-clearing method in teaching second year intermediate students “reading book”. To achieve the study objective, the researchers intentionally chose Arjwan middle school, located in Baghdad Directorate of Education Al-Rusafa/2, which includes five classes for the second intermediate class. Division (A) was chosen randomly to represent the experimental group, which is taught in the mind-clearing method, while Division (B) represented the control group, which is taught in the traditional way. The sample of the research included (79) female students divided into (39) students in the experimental group, and (40) female students in the control group.To achieve the objective of the res
... Show MoreThe purpose of this work is to determine the points and planes of 3-dimensional projective space PG(3,2) over Galois field GF(q), q=2,3 and 5 by designing a computer program.
The Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
First: People’s need for advocacy:
Calling for a legal necessity for all people, regardless of their races, colours, tongues, and culture, to explain the truth, spread fear, bring benefits, ward off evil, regulate a person’s relationship with his Lord, and his relationship with creatures, so that he knows his money and what he owes.
All of creation is in dire need of the call to God’s religion with insight due to their inability to reach out to goodness, righteousness, guidance, and success on their own. Man is limited in thinking in this universe, limited in his resolve, unable to know what will improve his affairs in the two worlds. His need for religion is one of the necessities of his life, and one of the comple
... Show MoreIt is very well known in the planning publications that when creating spacing development to a region or sub-region, it can be able to make more than an alternative consisting with the strategic directions overtaken from the actual development of region and the situational and developmental objectives needed. However, the difficulty facing the situational planning is in selecting one of these alternatives to be the best in order to make a balanced situational re-structure, and achieving the economic, social and civil objectives. The developmental situation elements in the regions and governorates, including (Karbala) impose themselves as situational power which implies the process of re-structural arrangement where the situational develo
... Show More