This study was carried out to determine the effects of NaCl (0.00, 50, 100, 150, 180 or 200) mM and two different types of mutagens chemical mutagen ethyl methyl sulphonate (EMS) at 0.5% and physical mutagen UV-B irradiation (40 min time exposure), on mitotic division in two Iraqi rice genotypes Amber 33 (A33) and Amber Baghdad (AB). Different concentrations of NaCl were used. Mitotic index (MI %) was decreased significantly by increasing NaCl concentration, however the highest mitotic index was recorded in mutated genotypes with EMS and UV-B. Different abnormal chromosomes were noticed in mutated plants. Results showed high percentage of abnormal chromosomes in EMS mutated genotypes. In addition no significant differences between genotypes
... Show MoreThe method of operational matrices based on different types of polynomials such as Bernstein, shifted Legendre and Bernoulli polynomials will be presented and implemented to solve the nonlinear Blasius equations approximately. The nonlinear differential equation will be converted into a system of nonlinear algebraic equations that can be solved using Mathematica®12. The efficiency of these methods has been studied by calculating the maximum error remainder ( ), and it was found that their efficiency increases as the polynomial degree (n) increases, since the errors decrease. Moreover, the approximate solutions obtained by the proposed methods are compared with the solution of the 4th order Runge-Kutta meth
... Show Moreفي البداية اود الاشارة الى ان فهم حقيقة الازمة هو ذو جانب فني يتعلق بالجينات الوراثية لنظام يملك في احيناته قدرة عالية على تفريخ المشتقات. هذا النظام الذي يزداد عقما وتدميرا يزداد قدرة على خلق النقود الائتمانية/المشتقات، وكلما اقتربنا اكثر من فهم هذا الجانب كلما اسقطت في ايدينا تلك التوصيفات الاكاديمية الجاهزة في نقص الرقابة والاشراف، تركيز المخاطر،....الخ التي تناولتها الكتابات الشائعة في معظم طروحات
... Show MoreA fast moving infrared excess source (G2) which is widely interpreted as a core-less gas and dust cloud approaches Sagittarius A* (Sgr A*) on a presumably elliptical orbit. VLT
Some methods recommended abroad to control the oriental hornet, Vespa orientalis L., attacking the honey bee, Apis mellifera L., colonies were tested, with some modifications, for the first time under the Iraqi conditions. One of these methods was carried out by covering the hive entrance with a piece of queen excluder to prevent the hornet from entering the hive. Also, the position of hive stand was reversed to deprive the hornet from using the flight board as a stage for waiting and creeping toward the defending bees. The second method was carried out by fixing a cardboard cone as a bee passage at the hive entrance to hinder the entry of the hornet into the hive. Both of these methods were found to be unsuccessful to
... Show MoreThe purpose of this work is to construct complete (k,n)-arcs in the projective 2-space PG(2,q) over Galois field GF(11) by adding some points of index zero to complete (k,n–1)arcs 3  n  11. A (k,n)-arcs is a set of k points no n + 1 of which are collinear. A (k,n)-arcs is complete if it is not contained in a (k + 1,n)-arc
The present study was carried to evaluate antibacterial activity of Acetone, Alcholic (cold and hot) and Aqueaus(water) extracts of Citrus aurantifoliaseeds,against growth of some bacteria isolated from burns infections(Pseudomonas aeruginosa,Escherichia coli, Klebsiellapneumonia,Staphylococcusaureus)fromKindy HospitalIn Baghdad from March to June 2012.Antibiotic Sensitivity was done for all isolated bacteria used in this study.Results showed variation in antibacterial activity of different extracts against all tested bacteria by well diffusion technique in agar and measuring the diameter of inhibition zone, at concentration 250Mg-ml. Acetone extract had the greatest inhibitory effect followed by hot alcoholci extract, and then cold alcohol
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThis study was aimed to investigate the response of two types of ornamental herbaceous plants (Wedelia trilobata and Jacobaea maritima 'Cirrus') to different agricultural environments and the application of potassium silicates to the living walls system LWS (Felt layer system) under the climate conditions of Baghdad city. Each experiment involved the cultivation of a different plant species, and the study duration was from September 15, 2021, to August 1, 2022. A Strip-Plot Design experiment was conducted using two factors: factor M with four levels of substrates (50% peatmoss and perlite (M1), 50% Vermicompost and perlite (M2), 50% Water hyacinth compost and perlite (M3), 50% wheat straw compost and perlite (M4)) and factor S with
... Show MoreWe define L-contraction mapping in the setting of D-metric spaces analogous to L-contraction mappings [1] in complete metric spaces. Also, give a definition for general D- matric spaces.And then prove the existence of fixed point for more general class of mappings in generalized D-metric spaces.