Wheat (Triticum aestivum L.) is one of the Poaceae family (Gramineae). Is momentous for human nutrition, and the stresses can affect strongly on the phenotype characteristics of the plant. The aim of this study was to determine how electric shock on germinated grain (for 2.5, 5, and 7.5 mins.) and heat shock at ( 35 oC, 40 oC and 45 oC) applied after phase out the radical length of 2-5 mm, from the grain of two wheat Varieties: “Baghdad 1” and “Babylon 113”. The electric shock for 2.5 mins., lead to delay of flowering, from day to 50 % flowering was 93 day, as well as, gave lowest value of plant height 64.5cm and lowest spike length was 10.7 cm. While The highest flag leaf area was obtained by electric shock for 5 mins. was 56.6 cm2 compared to control treatment which was 28.9 cm2. The effects of heat shock at 45 oC, gave maximum plant heights was 78.3 cm and highest spike length was 15.3 cm. In response to electric and heat stress in both varieties, clear differences were observed. Baghdad 1 variety gave the minimum days from sowing date to 50% flowering was 84.85 day and maximum plant height rate 73 cm, while highest rate of flag leaf area 48.1 cm2 and highest spike length was 13.8 cm, by Babylon 113 variety. There is significant interaction between varieties and treatments, Babylon 113 for Es 5 minutes, gave highest value of flag leaf area was 65.8 cm2, and highest spike length 16.7 cm,. Whereas Babylon 113 for Es 2.5 minutes, gave maximum days to 50% flowering which was 93 day, lowest value of plant height 60.5 cm, and lowest spike length 10 cm.
Extended calculations for sputtering yield through bombed Nickel – target by Xenon ions plasma are accomplished. The calculations include changing the input parameters: the energy of xenon ions plasma, the hit target angle of nickel target, thickness of the nickel target layer, and the slight change in the surface binding energy of Nickel. The program TRIM is used to accomplish these calculations. The results show that the sputtering yields directly dependent on these parameters. The change in angles of incidence plasma ions and energy leads to a significant change in the sputtering yields. On the other hand, the sputtering yields ore highly affected by changing target width and surface binding energy at fixed ion parameters.
Developing a new adaptive satellite images classification technique, based on a new way of merging between regression line of best fit and new empirical conditions methods. They are supervised methods to recognize different land cover types on Al habbinya region. These methods should be stand on physical ground that represents the reflection of land surface features. The first method has separated the arid lands and plants. Empirical thresholds of different TM combination bands; TM3, TM4, and TM5 were studied in the second method, to detect and separate water regions (shallow, bottomless, and very bottomless). The Optimum Index Factor (OIF) is computed for these combination bands, which realized
... Show MoreAbstract
Metal cutting processes still represent the largest class of manufacturing operations. Turning is the most commonly employed material removal process. This research focuses on analysis of the thermal field of the oblique machining process. Finite element method (FEM) software DEFORM 3D V10.2 was used together with experimental work carried out using infrared image equipment, which include both hardware and software simulations. The thermal experiments are conducted with AA6063-T6, using different tool obliquity, cutting speeds and feed rates. The results show that the temperature relatively decreased when tool obliquity increases at different cutting speeds and feed rates, also it
... Show MoreThis paper deals with the thirteenth order differential equations linear and nonlinear in boundary value problems by using the Modified Adomian Decomposition Method (MADM), the analytical results of the equations have been obtained in terms of convergent series with easily computable components. Two numerical examples results show that this method is a promising and powerful tool for solving this problems.
In this paper, subclasses of the function class ∑ of analytic and bi-univalent functions associated with operator L_q^(k, λ) are introduced and defined in the open unit disk △ by applying quasi-subordination. We obtain some results about the corresponding bound estimations of the coefficients a_(2 ) and a_(3 ).
The interactions of drug amoxicillin with maltose or galactose solutions with a variation of temperature have been discussed by taking in the volumetric and viscometric procedures. Physical properties [densities (ρ) and viscosities (η)] of amoxicillin (AMOX) aqueous solutions and aqueous solutions of two type saccharides (maltose and galactose 0.05m) have been measured at T = (298.15, 303.15 and 308.15) K under atmospheric pressure. The apparent molar volume (ϕv cm3mole-1) has been evaluated from density data and fitted to a Redlich-Mayer equation. The empirical parameters of the Mayer-Redlich equation and apparent molar volume at infinite dilution Ø°v were explicated in terms of interactions from type solute-solvent and solute
... Show MoreFinite Element Approach is employed in this research work to solve the governing differential equations related to seepage via its foundation's dam structure. The primary focus for this reason is the discretization of domain into finite elements through the placement of imaginary nodal points and the discretization of governing equations into an equation system; An equation for each nodal point or part, and unknown variables are solved. The SEEP / W software (program) is a sub-program of the Geo-Studio software, which is used by porous soil media to compensate for the problems of seepage. To achieve the research goals, a study was carried out on Hemrin dam, which located in the Diyala River 100 km northeast of Baghdad, Iraq. Thus, o
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More