Identification of pathogens and locating their inocul¬um source (S) are the first strategies toward successful disease management program the pretransplating seedl¬ing damping - off problem on vegetable crops was found to be caused by Pythium aphanidermatum and Rhizocto¬nia solani. Both fungi were isolated from peat (moss) for the first time in Iraq. In addition, considerable num¬ber of pathogenic fungi was found as contaminants in soil samples from Alrashidiah vegetable covered farming station. Among the isolated fungi were: Pythium apha¬nidermatum, Rhizoctonia solani, Sclerotinia sclerotiorum, Fusarium oxysporum, Fusarium solani phialophora spp., Cephalisporium spp Rizopus stolonfier and Botrytis cine¬rea, in addition to several of other folair pathogens Econo¬mic important diseases such as vascular wilt, stem and root rots, blight and fruit rots were found to be caused by those fungi on tomato, cucumber, cucurbit, eggplant and pepper plants that were grown at Alrashidiah. The results suggest that chemical, physical and / or biological treatments should be urgently applied for profitable vegetable growing at this station.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreA laboratory experiment was carried out according to a completely randomized design with four repetitions on the seeds resulting from a field experiment applied for the two seasons, 2020 and 2021, to find out the effect of the cultivars (Ambar 33, Yasamin, Dijlah, Ambar Al-Baraka and Furat 1) and the harvest dates (at physiological maturity and after 7 and 14, 21 and 28 days of physiological maturity) on the vigour of rice seeds. The results showed the superiority of the seeds of the cultivar Anbar Al-Baraka at first and final counting, dry weight of the seedling, seedling vigor index and electrical conductivity, and the superiority of the seeds of Dijla cultivar at accelerated aging test and cold test without significant difference with th
... Show MorePsidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MorePurpose: the purpose of this study is to investigate how managers working for the General Authority for Irrigation and Reclamation Projects react to the impact of Emotional Intelligence (EI) on their performance. Theoretical framework: The current study includes an intellectual framework on two variables, namely EI and Manager Performance (MP), because it is essential to investigate the relationship between these two variables and the impact of EI on MP. Design/methodology/approach: The research problem is that a manager's capacity to make wise decisions about their work or interactions with subordinates is diminished when they have inadequate EI. The questionnaire is used as a tool for gathering data for the study, and the st
... Show MoreThis paper examines the decolonizing methods used by Leslie Marmon Silko in her novel Ceremony (1977) to heal the indigenous people from the patriarchal traditions of the white hegemony. This study aims to emphasize the vulnerable responses of the Pueblo people to the memories of the clan and to highlight Silko’s methods to sustain the history and lifestyle of the indigenous people. Therefore, Silko’s novel can be situated historically and culturally within memory-studies. To analyze the contrasting behaviors of characters, this paper projects the relationship between the collective patriarchal doctrines and that of the individual within the framework of memory studies. Theories of Jan and Aleida Assmann are used here to explore the
... Show MoreThe effect of chronic exposure to two different levels of cadmium chloride (CdCl2) 30 ppb and 40 ppb in drinking water for 12 weeks on thyroid function of mature male rabbits was studied. Eighteen mature male rabbits were randomly divided into three groups (each of six ) , control group (group I ): were offered ordinary tap water , and treated groups (II and III ) were offered tap water containing 30ppb and 40 ppb respectively for 12 weeks .Serum concentration of thyroxin (T4 ) and triiodothyronine (T3) were measured every six weeks ,as an index of thyroid function , further more , section of thyroid gland were prepared for histological studies. The results showed that chronic exposure of male rabbits
... Show MoreComsol multiphysics software is established to make a simulation that is comparable with experimental device. by utilizing comsol, the positive column domain of direct-current glow discharge with argon is considered for both of different applied voltage and working gas pressure. The calculations are exhibited by using a precise collision cross sections and Townsend coefficients for the argon. The impacts of voltage and pressure on the Debye length, number of particles in Debye sphere and plasma frequency are calculated and graphically delineated. With this regard to the dependence of plasma parameters on the applied voltage and pressure, some of them are found to be compatible with the experimental
... Show MoreThe present study aims to investigate the long-term histopathological, and physiological effects of different concentrations of a commercially available energy drink (Tiger) on liver and kidney of young mice. Sixteen Balb/c male mice,6 -week old, were divided into 4 groups (n=4). Two groups consumed the energy drink at a concentration of 28µl energy drink/ml water. One group were killed after 10 days (T1), another group were killed after 20 days (T2). Other group of mice consumed the energy drink at a final concentration of 14µl/ml for 20 days (T3). The last group was provided only with water and served as control. Mice of all groups drank around 3 ml per day. The histopathological study on liver of treated groups showed many changes s
... Show More