To explore the durability of some local species of wood to fungal deterioration among the
storage period, this research has conducted on three species Eufcalyptus cammaldulensis,
Juglans regia, presence of some genus of fungi; Aspergillus, Penicillium,Botryoderma,
Chaetomium, Phoma, Cladosporium and Pacilomyces in different intensities.
The two fungi Aspergillus and Penicillium appeared more dominants than others, therefore
they were chosen for the pathogenicity test. The results showed that the two species of fungi
preferred Juglans wood firstly were the size of infection was more than 10 times of any of the
other two woods. Eucalyptus showed similar response to that of Morus, but with Aspergillus
it was few better.
Class consciousness represents its highest stage in the contemporary Marxist thought of Rosa Luxemburg and Antonio Gramsci, not just a reflection of reality, but rather a dialectical form through the reflection of consciousness on reality and its reproduction. The superiority over the infrastructure (historical materialism) promised the revolutionary class consciousness to be achieved spontaneously, and the seeds of a breakthrough are mass strikes, denying the role of the party to organize this awareness, limiting its role to the interconnection between classes, emphasizing the role of socialist democracy as a conscious vanguard for organizing spontaneity, struggle, and developing awareness during the revolutionary process and the leader
... Show MoreThroughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.
Czerwi’nski et al. introduced Lucky labeling in 2009 and Akbari et al and A.Nellai Murugan et al studied it further. Czerwi’nski defined Lucky Number of graph as follows: A labeling of vertices of a graph G is called a Lucky labeling if for every pair of adjacent vertices u and v in G where . A graph G may admit any number of lucky labelings. The least integer k for which a graph G has a lucky labeling from the set 1, 2, k is the lucky number of G denoted by η(G). This paper aims to determine the lucky number of Complete graph Kn, Complete bipartite graph Km,n and Complete tripartite graph Kl,m,n. It has also been studied how the lucky number changes whi
... Show MoreIn this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise closure topological spaces, fibrewise wake topological spaces, fibrewise strong topological spaces over B. Also, we introduce the concepts of fibrewise w-closed (resp., w-coclosed, w-biclosed) and w-open (resp., w-coopen, w-biopen) topological spaces over B; Furthermore we state and prove several Propositions concerning with these concepts.
Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreBN Rashid, Social Sciences, 2022
Five levels of Zn-EDTA fertilizer and foliar application of boron were used to study the local rice response through studying of some vegetative and reproductive growth characters, by conducting two field experiments at Kanipanka Agricultural Research Station during the summer season of 2004 by using RCBD with three replications. Significant differences were found in studied characters, there were increase in the number of days from seeding to 50% flowering (94.330-96.233) days, from 50% flowering to physiological maturity (37.50-38.28) days, plant height (82.50-91.423) cm and LAI (5.441-7.525). Reproductive characters such as number of grains panicle-1 (74.11-85.88), number of panicles m-2 (321.00-426.083), biological yield (8166.166-11082
... Show More