The experiment was conducted in twodifferentsplaces, one of this experiment in the field was not under salt stress and the other experiment field was under salt stress.Those experiments were conducted in college of AgricultureDiyalaUniversity atautmyseason (2015 - 2016)to study the salt stress by usingseeds soaking with Hydrogen Peroxide and foliar application in different concentrations ofAbscisic acid.The experiment statistical design as RCBD was with three replicates.Soaking the seeds withHydrogen Peroxidetreatments 0 , 10 , 15 , 20 mmol.L-1. Three Abscisic acid levels0 , 15 , 30 mg.L1.α -Tocopherol, Catalase Enzyme, Membrane Stability Index,proline content, leaves area andpercentage of Electrolyte Leakage of Wheat, were measured. Results drawn from these were as follows: The α -Tocopherol concentrations, Catalase Enzyme,Proline content and percentage of Electrolyte Leakageincrease withsalt stress for soil,comparing with soil not under salt stress. The results showed that fourth level of Hydrogen Peroxide Soaking(20)superior on the levels (0)of α-Tocopherol concentrations, Catalase Enzyme,Membrane Stability Index, proline acid concentration and leaves areaincreased in values(78.88%, 135.54%, 17.47%, 34.04% ,16.36%) respectively with soil under Salt Stress.The results show increase in α-Tocopherol concentrations, Catalase Enzyme and percentageof Electrolyte Leakagewith low amount of Abscisic acid sprayingABA0(0 mg.L¹)comparing with the ABA1(15 mg.L-¹)and ABA2(30 mg.L-¹),but the treatment of spraying abscisic acid outperformedsignificantly increasedin the Membrane Stability Index anproline acid concentrationin leaveswith increase at the level ofABA2(30 mg. L-1)compareing with the other levels ofin the soil under salt stress. Theα-Tocopherol concentrations and Catalase Enzyme wereincreasedsignificantlyby interaction between(20mmol.L-1H2O2 +0 mg ABA. L1) comparing with the other levels in the soil that was under salt stress. . The Catalase Enzyme increase in the level(20 mmol.L-1H2O2 + 0 mg ABA .L-1) in the soil that was not under salt stress.Interference between (20 mmol.L-1H2O2+30mgABA.L-1) showedinsignificant effect on the Membrane Stability Indexandproline acid concentrationsin leavesat the soil that was under salt tension and proline acid concentrationsat leaves in the soil which was not under salt stress.Also most of characters in plant were significantly influenced by Hydrogen Peroxide under salt stress.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
In this paper we introduce a new type of functions called the generalized regular
continuous functions .These functions are weaker than regular continuous functions and
stronger than regular generalized continuous functions. Also, we study some
characterizations and basic properties of generalized regular continuous functions .Moreover
we study another types of generalized regular continuous functions and study the relation
among them
Today the NOMA has exponential growth in the use of Optical Visible Light Communication (OVLC) due to good features such as high spectral efficiency, low BER, and flexibility. Moreover, it creates a huge demand for electronic devices with high-speed processing and data rates, which leads to more FPGA power consumption. Therefore; it is a big challenge for scientists and researchers today to recover this problem by reducing the FPGA power and size of the devices. The subject matter of this article is producing an algorithm model to reduce the power consumption of (Field Programmable Gate Array) FPGA used in the design of the Non-Orthogonal Multiple Access (NOMA) techniques applied in (OVLC) systems combined with a blue laser. However, The po
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.
The energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.
Waste is one of the most important problems affecting the city’s environment and its urban landscape, which results from the activities and activities of man and the natural environment. Its sources have varied between residential, commercial, industrial, medical and hazardous, and its spread in cities, on roads and on abandoned open lands, has led to significant negative effects and risks to human health and the environment.
Therefore, there were serious attempts to deal with waste and follow sequential steps that formed a waste management system such as (collection, sorting, transport, then treatment and disposal). Preventing and reducing waste, then recycling and recovering by composting or burning, and ending with bu
... Show MoreThe importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p
... Show MoreThis research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show More