The aim of this study was to investigate the genetic diversity and markers associated with salinity tolerance in three genotypes of wheat created for salt tolerance by plant breeding program, as well as two Iraqi varieties using random amplified polymorphic cDNA (RAPD-PCR) with eight primers were used. The results of RAPD marker revealed that there are genetic variations in several particular segments of various sizes between the selected genotypes and the local varieties with more genetic variation except for (OPG-09) did not appear any band with the selected genotypes and local cultivars. The results of the phylogenetic tree analysis (cluster) based on the presence or absence of DNA amplified for each primer were used to classify similar genotypes into two main groups (1H, Iraq) genotypes were clustered in first group with a genetic distance of 85% and (2H, Ibaa99) genotypes clustered in second group with a genetic distance of 84%.The results of genetic similarity based on RAPD data shows the relationship between the selected genotypes and local cultivars, the highest genetic distance was 0.428571 between the selected genotypes (1H and 2H) and the local cultivar of (I), and the lowest value was 0.066667 between the selected genotype (1H and 3H). The results confirmed the efficiency of RAPD based cDNA technique of those genotypes that are studied for determination of genetic diversity and distance among them.
Francisco de Quevedo is a well-known man of letters in the Golden Age of Spanish literature. He is the witness who related to us, in his works, the Spanish community in that era. He showed in most of his writings the political weakness of Spain, and made prominent the remarkable literary aspect of Spain. He had a very good tlent for poetry, and a rather polite style in exploiting colloquialisms in his literary writings. He wrote about philosophy, where his most prominent work was "The cradle and the grave". The writer was also very well-known for his puns which were employed to clarify his inner thoughts regarding the Spanish situation at that time.
Resume
... Show MoreIn this work, two different laser dye solutions were used to host highly-pure silicon nitride nanoparticles as scattering centers to fabricate random gain media. The laser dye was dissolved in three different solvents (ethanol, methanol and acetone) and the final results were obtained for methanol only. The silicon nitride nanoparticles were synthesized by dc reactive magnetron sputtering technique with average particle size of 35 nm. The random gain medium was made as a solid rod with high spectral efficiency and low production cost. Optical emission with narrow linewidth was detected at 532-534 nm as 9 mg of silicon nitride nanoparticles were added to the 10 -5 M dye solution. The FWHM of 0.3 and 3.52 nm was determined for Rhodamine B and
... Show MoreMarket share is a major indication of business success. Understanding the impact of numerous economic factors on market share is critical to a company’s success. In this study, we examine the market shares of two manufacturers in a duopoly economy and present an optimal pricing approach for increasing a company’s market share. We create two numerical models based on ordinary differential equations to investigate market success. The first model takes into account quantity demand and investment in R&D, whereas the second model investigates a more realistic relationship between quantity demand and pricing.
Dropping packets with a linear function between two configured queue thresholds in Random Early Detection (RED) model is incapable of yielding satisfactory network performance. In this article, a new enhanced and effective active queue management algorithm, termed Double Function RED (DFRED in short) is developed to further curtail network delay. Specifically, DFRED algorithm amends the packet dropping probability approach of RED by dividing it into two sub-segments. The first and second partitions utilizes and implements a quadratic and linear increase respectively in the packet dropping probability computation to distinguish between two traffic loads: low and high. The ns-3 simulation performance evaluations clearly indicate t
... Show MoreThis research sought to present a concept of cross-sectional data models, A crucial double data to take the impact of the change in time and obtained from the measured phenomenon of repeated observations in different time periods, Where the models of the panel data were defined by different types of fixed , random and mixed, and Comparing them by studying and analyzing the mathematical relationship between the influence of time with a set of basic variables Which are the main axes on which the research is based and is represented by the monthly revenue of the working individual and the profits it generates, which represents the variable response And its relationship to a set of explanatory variables represented by the
... Show MoreSimple, rapid and sensitive spectrophotometric method was proposed for the analysis of metoclopramide hydrochloride (MPH) in pure form as well as in pharmaceutical tablets. The method is based on the diazotization reaction of MPH with sodium nitrite in hydrochloric acid medium to form diazonium salt, which is coupled with 1-naphthol in sodium hydroxide medium to form azo dye, showing absorption maxima at 550 nm. Beer’s law is obeyed in the concentration range of 0.4 – 18 µg mL-1 of MPH with detection limit 0.5448 µg mL-1. The molar absorptivity and Sandell’s sensitivity are 3.4969 × 104 L mol-1 cm-1 and 0.0101 µg cm-2, respectively. The method was successfully applied to the determination of MPH in pharmaceutical tablets with
... Show MoreThe modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the
... Show MoreThe detection of diseases affecting wheat is very important as it relates to the issue of food security, which poses a serious threat to human life. Recently, farmers have heavily relied on modern systems and techniques for the control of the vast agricultural areas. Computer vision and data processing play a key role in detecting diseases that affect plants, depending on the images of their leaves. In this article, Fuzzy- logic based Histogram Equalization (FHE) is proposed to enhance the contrast of images. The fuzzy histogram is applied to divide the histograms into two subparts of histograms, based on the average value of the original image, then equalize them freely and independently to conserve the brightness of the image. The prop
... Show MoreTo identify the fungi associated with water hyacinth (Eichhornia crassipes [Mart.] Solms), an aquatic weed, which presents in Tigris river from Baghdad south ward. Five regions from middle and south of Iraq (Al-Noumanya, Saeid Bin-Jubier, Al-Azizia, Al-Reyfay and Al-Hay) were selected for this study. Twelve fungal species were isolated. Alternaria alternata, Acremonium sp and Cladsporium herbarum, were the most frequently species (91.66 % ,50 % and 25 %) respectively. The fungi Alternaria alternata, Acremonium sp. and Phoma eupyrena were more aggressive to water hyacinth as (91.66%,83,33%, and 75%) in pathogenicity test.
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More