The experiment was conducted in the glasshouse of Biology Dept. ,College of Education
Ibn- Al- Haitham ,University of Baghdad, during the growing season(2011), to study the
effect of sprying potassium sulphate at (0,200,400,600) ppm and cytokinin at (0,75,150)ppm
and their interactions on number of branches , protein percentage , carbohydrate percentage ,
absolute growth rate , biomass duration , relative efficiency of fertilizer and value of the
secondary productivity ,in Lentil plant cultivar(Baraka).
Results indicated that foliar sprying of potassium sulphate and cytokinin and their
interactions gave a significant effect on all vegetative growth parameters of lentil plant. the
concentration600 ppm of potassium sulphate and the concentration150 ppm of cytokinin
gave the highest values of absolute growth rate , and the concentration 400 ppm of potassium
sulphate and the concentration 150 ppm of cytokinin gave the best values of protein
percentage , carbohydrate percentage ,biomass duration and relative efficiency of fertilizer,
also the concentration 600 of potassium sulphate and the concentration 75 ppm of cytokinin
gave the best values of number of branches and the value of the secondary productivity.
This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of 1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.
In this research, a new technique is suggested to reduce the long time required by the encoding process by using modified moment features on domain blocks. The modified moment features were used in accelerating the matching step of the Iterated Function System (IFS). The main disadvantage facing the fractal image compression (FIC) method is the over-long encoding time needed for checking all domain blocks and choosing the least error to get the best matched domain for each block of ranges. In this paper, we develop a method that can reduce the encoding time of FIC by reducing the size of the domain pool based on the moment features of domain blocks, followed by a comparison with threshold (the selected threshold based on experience
... Show MoreCosmetic products contain variable amounts of nutrients that support microbial growth. Most contaminants in cosmetic products include bacteria such as Staphylococcus, Pseudomonas, Klebsiella, Achromobacter and Alcaligenes. Contaminated water is a likely source of organisms found in cosmetic products. Products such as shampoo, hand and body lotion, facial cleanser, and liquid soaps were analyzed. In this study, out of 60 cosmetic products analyzed, 26.4% were found to be contaminated. Most of the contamination was from bacteria and no fungal contamination was detected. The highest level o
... Show Moreتشكل التغيرات الحاصلة في اسعار النفط تحديا" حقيقيا" لاستمرار عملية النمو في العراق, وامام الحكومة فرصة كبيرة لإيجاد حلول ناجعة لمشكلة تزايد عجز الموازنة العامة من خلال اللجوء الى اصدار ادوات الدين العام الداخلي والخارجي, وهذا يتطلب بناء استراتيجية لإقامة وتطوير سوق السندات الحكومية في العراق, لتتمكن الحكومة من خلاله توفير مصادر تمويل اضافية, تسهم في تمويل الانفاق الاستثماري الحكومي ودعم النمو ودعم
... Show MorePiled raft is commonly used as foundation for high rise buildings. The design concept of piled raft foundation is to minimize the number of piles, and to utilize the entire bearing capacity. High axial stresses are therefore, concentrated at the region of connection between the piles and raft. Recently, an alternative technique is proposed to disconnect the piles from the raft in a so called unconnected piled raft (UCPR) foundation, in which a compacted soil layer (cushion) beneath the raft, is usually introduced. The piles of the new system are considered as reinforcement members for the subsoil rather than as structural members. In the current study, the behavior of unconnected piled rafts systems has been studie
... Show MoreThe concept of strong soft pre-open set was initiated by Biswas and Parsanann.We utilize this notion to study several characterizations and properties of this set. We investigate the relationships between this set and other types of soft open sets. Moreover, the properties of the strong soft pre-interior and closure are discussed. Furthermore, we define a new concept by using strong soft pre-closed that we denote as locally strong soft pre-closed, in which several results are obtained. We establish a new type of soft pre-open set, namely soft pre-open. Also, we continue to study pre- soft open set and discuss the relationships among all these sets. Some counter examples are given to show some relations
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show More
An experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the avera
... Show More