The present study was carried out in the experimental in the nursery at Al – Dorah (Baghdad). During spring 2015 under natural environmental conditions in plastic house to evaluated the effect of different concentrations of IBA (100, 300, 500, 700 and 1000( mg/1 on different cutting position (basal, sub terminal and terminal) for different dipping times (24, 48) hours, on Cassia surattensis Burm. stem cuttings rooting. After 2 months of planting the results demonstrated that the basal cutting treated with 1000 mg/l IBA in 48 hours dipping time showed the earlier rooted period (4) weeks compared with control treatment 8 weeks. The same treatment also gave the highest mean rooting numbers 1.56per cutting and the highest mean rooting lengths 2.88 cm compared with other treatments. The 1000 mg/l IBA treatment with basal and sub terminal gave the highest mean value of rooting percentage 55.5% in both dipping times compared with control treatment that gave 0.0%.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The present work investigates the effect of; superficial air velocities of: 1, 3, and 6 cm/s for two types of perforated distributor on hydrodynamic characteristic in a gas-liquid dispersion column of; air-water, and airaqueous-n-propanol solution. Bubble distribution, gas holdup, and power consumption are parameters take in consideration. Experimental work was carried out in perspex column of 8.5 cm inside diameter and 1.5 m height. Two types of bubble generator (perforated plate) were fixed at the bottom of the column; plate A (99 holes of 0.5 mm diameter and free area of 0.34%), plate B (20 holes of 1.5 mm diameter and free area of 0.62%). Photographic technique was used to measure the bubble parameters. The experimental results were
... Show MoreIn the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p
... Show MorePlagiarism Detection Systems play an important role in revealing instances of a plagiarism act, especially in the educational sector with scientific documents and papers. The idea of plagiarism is that when any content is copied without permission or citation from the author. To detect such activities, it is necessary to have extensive information about plagiarism forms and classes. Thanks to the developed tools and methods it is possible to reveal many types of plagiarism. The development of the Information and Communication Technologies (ICT) and the availability of the online scientific documents lead to the ease of access to these documents. With the availability of many software text editors, plagiarism detections becomes a critical
... Show MoreIn this paper, a comparison between horizontal and vertical OFET of Poly (3-Hexylthiophene) (P3HT) as an active semiconductor layer (p-type) was studied by using two different gate insulators (ZrO2 and PVA). The electrical performance output (Id-Vd) and transfer (Id-Vg) characteristics were investigated using the gradual-channel approximation model. The device shows a typical output curve of a field-effect transistor (FET). The analysis of electrical characterization was performed in order to investigate the source-drain voltage (Vd) dependent current and the effects of gate dielectric on the electrical performance of the OFET. This work also considered the effects of the
... Show MoreThis paper is focusing on reducing the time for text processing operations by taking the advantage of enumerating each string using the multi hashing methodology. Text analysis is an important subject for any system that deals with strings (sequences of characters from an alphabet) and text processing (e.g., word-processor, text editor and other text manipulation systems). Many problems have been arisen when dealing with string operations which consist of an unfixed number of characters (e.g., the execution time); this due to the overhead embedded-operations (like, symbols matching and conversion operations). The execution time largely depends on the string characteristics; especially its length (i.e., the number of characters consisting
... Show MoreThe importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreIn this study, we report a statistical study for the relationship between coronal mass ejections (CMEs) and sunspot number (SSN) that were registered during the period 2008-2017 for the solar cycle 24. SSN was extracted from Sunspot Index and Long-term Solar Observations (SILSO), while CMEs number from observations made by the Large Angle and Spectrometric Coronagraph (LASCO) on board the Solar and Heliospheric Observatory mission (SOHO). The present period was adopted to conduct the investigation and obtain the mutual correlation between SSN and CMEs. The relationship between CME, the speed of halo CME, and partial halo CMEs for solar cycle 24 were studied. The analysis of results indicated that the average speed of halo CMEs is almost
... Show MoreThis study examines the dynamic relationship between stock market and economic activity in the United States to verify the possibility of using financial indicators to monitor the turning points in the expected path of future economic activity. Has been used methodology (Johansen - Juselius) for the Co-integration and causal (Granger) to test the relationship between the (S & P 500 , DJ) index and gross domestic product (GDP) in the United States for the period
(1960-2009). The results of the analysis revealed the existence of a causal relationship duplex (two-way) between the variables mentioned. which means the possibility of the use stock market indicators to pre
Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show More