A factorial experiment (2× 3) in randomized complete block design (RCBD) with three replications was conducted to examine the effect of honeycomb selection method using three interplant distances on yield and its components of two cultivars of bean, Bronco and Strike. Interplant distances used were 75× 65 cm, 90× 78 cm, and 105× 91 cm (row× plant) represent short (high plant density), intermediate (intermediate plant density), and wide (low plant density) distance, respectively. Parameters used for selection were number of days from planting to the initiation of first flower, number of nodes formed prior to first flower, and number of main branches. Results showed significant superiority of the Bronco cultivar represented in the number of pods per plant, number of seeds per pod, and the total length of pods which were 23.1 pods/plant, 5.71 seeds/pod, and 13.09 cm, respectively. Moreover, total carbohydrates%, fibers%, and total soluble solids% were significantly higher in the pods of Bronco cultivar compared to Strike. Low and intermediate plant density gave the highest yield per plant. However, the high plant density gave the highest early and total yields which were 0.517 and 1.719 ton/ha, respectively.
Abstract
The open budget means everyone in the society can get information about the government budget in order to watch the governmental works. The aim of the research is to study the concepts of open budget, its advantage, limitations, role of supporting the transparency and questioning the administrative and financial corruption. Thus reflects positively on the national economy by providing governmental information to all users whether they are individuals or belong to the political class, or any other governmental or nongovernmental organizations which are interested in these information.
In order to achieve the objectives of the research aims, we make questionnaire to see aca
... Show MoreCorruption (Definition , Characteristics , Reasons , Features , and ways of combating it)
Four genetic populations ( P1 , P2 , F1 , F2) were used in this study .
The parental cross in barley ( P1 barakq and P2 Pakistan ) was done . Many quantitative
pheno types were estimated such as plants length , tillers number , grains yield , capsules
number , the number of grains per capsule and the weight of 1000 grains . The results showed
significant differences in genetic variance values in the seconed filial generation ( F2) for all
the studied phenotypes : High values for the heritability were observed for all the studied
phenotypes .
These results indicated the effect of additive and non-additive genes on the quantitative
phenotypes . Finally , the selection of first generation can utilized for impro
A laboratory experiment was carried out at the College of Agriculture University of Baghdad in 2017. The aim was to improve the anatomical and physiological traits of broad bean seedling under salt stress by soaking it in salicylic acid. The concentrations of salicylic acid were 0, 10, and 20 mg L-1 and the electrical conductivity levels were 0, 3, and 6 dS m-1. The complete randomized design was used with four replications. The increasing of salicylic acid concentration up to 10 mg L-1 led to increasing the stem cortex thickness, stem vascular bundles thickness, and root cortex thickness significantly by (34.9,36.7,and 55 µm) respectively, while the treatment of 20 mg L-1 led to decreasing these traits by (28.2, 27.8, and 48.1 µm
... Show MoreIsthmus life and prepare for it
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show More