A field experiment was conducted during winter season of 2021 at a research station of college of agricultural engineering sciences, university of Baghdad to determine the response of active fertility percentage and seed yield and its components of faba bean (Vicia faba L. cv. Aguadulce) to distance between plants and spraying of nano and traditional boron. A Randomized Complete Block Design according to split-plots arrangement was used at three replicates. The main plots were three distances between plants (25, 35 and 45 cm), while the sub plots including spraying of distilled water only (control treatment), spraying of boron at a 100 mg L-1 and spraying of nano boron at two concentrations (10 and 15 mg L-1). The results showed that the 25 cm distance between plants was significantly superiority and gave a highest mean of seed yield (4.968 ton ha-1), whereas the 45 cm distance between plants was significantly superiority and gave highest means of number of branches (10.83 branch plant-1), number of flowers (400.4 flower plant-1), number of pods (28.36 pod plant-1), active fertility percentage (7.10%) and umber of seeds (6.66 seed pod-1). The spraying of nano boron at a 10 mg L-1 was significantly superior and gave the highest means of number of pods (26.91 pod plant-1), active fertility percentage (7.01%), number of seeds (6.23 seed pod-1) and seed yield (4.334 ton ha-1), while the spraying of nano boron at a 15 mg L-1 was significantly superior and gave the highest means of number of branches (9.83 branch plant-1) and number of flowers (400.0 flower plant-1). The interaction between two factors had significant effect on the most studied traits.
The most common artifacts in ultrasound (US) imaging are reverberation and comet-tail. These are multiple reflection echoing the interface that causing them, and result in ghost echoes in the ultrasound image. A method to reduce these unwanted artifacts using a Otsu thresholding to find region of interest (reflection echoes) and output applied to median filter to remove noise. The developed method significantly reduced the magnitude of the reverberation and comet-tail artifacts. Support Vector Machine (SVM) algorithm is most suitable for hyperplane differentiate. For that, we use image enhancement, extraction of feature, region of interest, Otsu thresholding, and finally classification image datasets to normal or abnormal image.
... Show MoreIn this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.
In this paper, we proved that if R is a prime ring, U be a nonzero Lie ideal of R , d be a nonzero (?,?)-derivation of R. Then if Ua?Z(R) (or aU?Z(R)) for a?R, then either or U is commutative Also, we assumed that Uis a ring to prove that: (i) If Ua?Z(R) (or aU?Z(R)) for a?R, then either a=0 or U is commutative. (ii) If ad(U)=0 (or d(U)a=0) for a?R, then either a=0 or U is commutative. (iii) If d is a homomorphism on U such that ad(U) ?Z(R)(or d(U)a?Z(R), then a=0 or U is commutative.
Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando
... Show MoreBackground: The hepatitis G virus( HGV), also called hepatitis GB virus, as a member of the Flaviviridae family distantly related to hepatitis C virus (HCV), Little is known about the frequency of HGV infection, the nature of the illness, or how to prevent it. What is known is that transfused blood containing HGV has caused some cases of hepatitis. They infect humans, but are not known to cause human disease. This virus can be transmitted efficiently by blood transfusion and by other parenteral mechanisms. Transient and long lasting infections with HGV have been documented in man.
Patients and methods: HBs Ag, Anti-HCV IgG and Anti-HGV IgG were detected by Enzyme-Linked Immunosorbent Assay (ELISA).HCV RNA
Backgrund: This study was carried out to determine the prevalence of chlamydia the pneumonia in community-acquired pnevmonia in Iraq.
The study aimed to reveal the level of knowledge and tendencies of high- study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with brain-based learning (BBL). And Then, putting a proposed concept to develop knowledge and tendencies of high-study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with Brain-based learning (BBL). For achieving this goal, a cognitive test and a scale of tendency were prepared to apply harmonious strategies with brain-based learning. The descriptive approach was used because it suits the goals of the study. The study sample consisted of (70) male and female students of postgraduate
... Show MoreComplement activation leads to membrane attack complex formation, which can lyse not only pathogens but also host cells. Histones can be released from the lysed or damaged cells and serve as a major type of damage-associated molecular pattern, but their effects on the complement system are not clear. In this study, we pulled down two major proteins from human serum using histone-conjugated beads: one was C-reactive protein and the other was C4, as identified by mass spectrometry. In surface plasmon resonance analysis, histone H3 and H4 showed stronger binding to C4 than other histones, with KD around 1 nM. The interaction did not affect C4 cleavage to C4a and C4b. Because histones bin
pancreatic islets in which a process of programmed cell death (apoptosis) is elicited in the β-cells by interaction of activated T-cells and proinflammatory cytokines in the immune infiltrate. Interleukin-6 (IL-6) is a pleiotropic cytokine with a key impact on both immunoregulation and nonimmune events in many cell types .
Objective: to assess the level of serum IL-6 as an inflammatory marker in type 1 diabetic children, with correlation to FBG and HbA1c.
Subjects and methods: 45 type 1 diabetic child (20 males and 25 females), mean age 10.9± 3.4 years who attended the National Diabetic Center, Al-Mustansiria university were included in this study. 45 apparently healthy controls matched for age and sex were participated in this s