Identification of pathogens and locating their inocul¬um source (S) are the first strategies toward successful disease management program the pretransplating seedl¬ing damping - off problem on vegetable crops was found to be caused by Pythium aphanidermatum and Rhizocto¬nia solani. Both fungi were isolated from peat (moss) for the first time in Iraq. In addition, considerable num¬ber of pathogenic fungi was found as contaminants in soil samples from Alrashidiah vegetable covered farming station. Among the isolated fungi were: Pythium apha¬nidermatum, Rhizoctonia solani, Sclerotinia sclerotiorum, Fusarium oxysporum, Fusarium solani phialophora spp., Cephalisporium spp Rizopus stolonfier and Botrytis cine¬rea, in addition to several of other folair pathogens Econo¬mic important diseases such as vascular wilt, stem and root rots, blight and fruit rots were found to be caused by those fungi on tomato, cucumber, cucurbit, eggplant and pepper plants that were grown at Alrashidiah. The results suggest that chemical, physical and / or biological treatments should be urgently applied for profitable vegetable growing at this station.
Background: A Catheter-associated with candidiasis infection is the most common nosocomial infection and the objective of this work is to isolate and identify Candida species from catheterized patients by ordinary culture and PCR.Objective:To study the isolation and identification of Candida species from catheterized patients by culture media and polymerase chain reaction(PCR).Methods: One hundred and thirty five Candida species isolates were obtained from urine culture of catheterized specimens from male and female patients , During the period between October 2011 to April 2012 , attending AL-Ramadi general teaching Hospital. A quantitative urine culture for isolation and identification of Candida species was. The isolation of Candida s
... Show MoreThe purpose of this study is to examine the moderating role of business environment on the relationship between Entrepreneurial Skills (ES) and business performance of Small Business (SB) in Iraq, Baghdad. This study aims to resolve the inconsistencies found in the contemporary literature regarding the relationship between ES and business performance. Questionnaire using a 5-point Likert scale was adopted from previous work to ascertain the responses of the respondents. Survey research design was adopted, and self-administered questionnaires were used to collect the data from small business owners in 9 districts in Baghdad the capital of Iraq. The analysis was conducted using SPSS version 23.0. The direct relationship and hierarchical regre
... Show MoreCarrageenan extract is a compound of sulfated polyglycan that is taken out from red seaweeds. Being hydrocolloid in nature, carrageenan has gelling, emulsifying and thickening properties allowing it to be commonly used in the oral healthcare products and cosmetics. Due to its bioactive compounds, carrageenan has been shown to have antimicrobial, antiviral, and antitumor properties. The purpose of this work is to study the probable use of carrageenan on the diseases that are related to oral cavity and on the genomic DNA in in vitro experimental model
In this study, the effects of k-carrageenan on four different cell lines related to the cancer and normal cells which cultured on selective media were done. Moreover, the eff
... Show MoreAbstract
This study turns about The Military Thinking and His Islamic balance in
The Caliph Ali Bin Abi Talib ( peace is on him ) Compact to Malek Al Ashtar
(God be pleased on him )The military field is very wide in all intellectual and
practically effects at The Caliph Ali Bin Abi Taleb(peace is on him ). Its
considered the first seed for islam ,therefore,there are a lot from military
situtions which proved his practical experience in these affairs , and away
from the details of war and practical battles lets search the sample and the
academic study for fair military thinking (justice) in The Compact of Caliph Ali
to Malek Al Ashtar when he became the ruler of egypt.
The military fair thinking determines fr
Flavonoids were extracted from Zizyphus spina-christi leaves by Ethyl acetate after acid digested and used as antioxidant. The dried extract was added separately to each sample of fat extracted from hallow cow and sheep bones as follows: T1 cow fat, T2 control for cow fat, T3 sheep fat and T4 control for sheep fat (the control T2 and T4 reffered to samples without added antioxidant).
Samples were stored at -18, 5, 25 and 55 °C for 28 days. The storage trials were conducted at -18, 5 and 25 °C for 28 days for T1, T2, T3 and T4. The chemical indices examined initially and at the end of storage period. PVs was 1.46, 1.46, 1.8 and 1.8 meq/ Kg oil respectively, FFA values were 0.245, 0.245, 0.244 and 0.244% respectively and TBA va
It is very known how great is the role of the Jewish writers in the system of the Zionist movement. The movement relied on writers and writers to carry out their programs, especially those pertaining to the creation of a "national homeland" for Jews. Most Jewish writers sang of Palestine even though they were not born there.
On such a basis, we have followed closely the writings of writers, critics and others by the end of the nineteenth century and the beginning of the twentieth century. We found that these writings are based on one common question: What is the fate of the Jewish people?
Most of these writings were accompanied by Theodor Herzl's proj
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThis study uses the performance of the discretionary estimation models by using a sample of listed companies in the Netherlands and Germany. The actual accounting framework provides a wide opportunity for managers to influence data in financial reporting. The corporate reporting strategy, the way managers use their discretionary accounting, has a significant effect on the company's financial reporting. The authors contribute to the literature through enhancement to these models to accomplish better effects of identifying earnings management as well as to present evidence that is particular to the Dutch and German setting.
For this, we followed the methodology of Dechow, Sloan, and Sweeney (1995) and Chan
... Show More