This study was carried out at the Dept. Hortic. and Land.Gard., Coll. Agric. Eng.Sci., University of Baghdad during fall season of 2019-2020, in order to evaluate the effect of nutrient solution type under hydroponic system (NFT) on growth, yield and quality of broccoli Brassica oleracea var.italica. Two experiments were carried out which were the standard solution experiment (Cooper) and the alternative solution experiment (ABEER) prepared from fertilizers. Results revealed that the type of solution used in the hydroponics system had non significant effect on the leaves content of N,K, Mg, Fe, Cu, B, Chlorophyll, leaves number, root length, weight of the main heads, number of side heads were not significantly affected. 13nt, reflected on the productivity under the nutrient solution (45.87 and 44.78 ton ha-1 for the standard and alternative solutions, respectively), While the effect of the alternative solution was recorded a significant increment for each of the leaves percent of phosphorous, manganese and zinc concentration, Number of days until harvest 50% of the plants (0.65%, 23.84,59.56 mg kg-1, 94.74 day respectively ),compared to the standard solution, which recorded a significant increment in the calcium percent in the leaves, plant height, leaves area, shoots dry weight, roots dry weight, shoots: roots dry weight, diameter of the main heads and weight of the side heads. As for the yield quality parameters, Results revealed the type of nutrient solution non significant effect on quality of broccoli. The results could be recommend the alternative solution (ABEER) as a promising nutrient solution in hydroponics system.
In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreThis paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward
... Show MoreMost of the propositions and researches that dealt with fashions in the Middle East, specifically this region from the world, from a historical perspective have not been sufficient, and were characterized by many aspects of immature thinking, in addition, they have been varied in quality. This can be attributed to many factors including: the focus in the field of researches and Middle East studies is on languages, arts, history, and political thinking of the region. Other factors are the information asymmetry, the differences in sources and references, in addition to differences in the scientific value of these sources added to the difficulty of gathering them at the same time especially that these sources are scattered in many places wh
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThe importance of this research has been to rationalize the cost of producing maize seeds through the followers of modern techniques and methods in agricultural activities such as genetic engineering for increasing production efficiency of maize seeds as well as the importance of calculating seed cost rationalization through the ABC system and thus rationalizing government spending. The research is based on one hypothesis in two ways that the use of genetic engineering on maize seeds works to: one - increase production efficiency of seeds and savings in agricultural inputs. 2. Rationalize the costs of examining and planting maize seeds. In order to calculate the costs will be based on the cost system based on activities ABC. The research
... Show MoreLaboratory studies were conducted at the biological control unit, college of Agriculture, University of Baghdad to evaluate some biological aspects of the predator Chilocorus bipustulatus (Coleoptera: Coccinellidae), which is considered one of the most important predators on many insect pests, especially the scale insect, Parlatoria blanchardi, (Homoptera: Diaspididae) on date palms. The results showed that biological parameters of the predator were varied according to different degree of temperature. Egg incubation period was significantly different and reached to 7.5 and 5.44 day at 25 and 30°C respectively, Fertility was the same 100% at both temperature degrees. Larval growth periods were 17.41 and 16.12 day as well as the mortality du
... Show MoreBackground: The novel coronavirus disease (COVID-19) is caused by Severe acute respiratory syndrome coronavirus 2 (SARS-Cov2) which utilizes angiotensin converting enzyme2 (ACE2) to invade the host cells. This membrane-bound peptidase is widely distributed in the body; its activity antagonizes the renin-angiotensin-aldosterone system (RAAS). Once SARS-Cov2 enters the cell, it causes downregulation of ACE2, resulting in the unopposed activation of RAAS. The unregulated activity of the RAAS system can deteriorate the prognosis in COVID-19 patients. A soluble form of ACE2 (sACE2) was reported to have a role in the SARS-Cov2 invasion of the susceptible cells.
Aim of the study: This study aims to inve
... Show MoreThis research aims at identifying the system of applying the QRcode system for acquisition of chemistry by first class female students studying at intermediate schools knowledge and its effect on creative thinking. The research sample consisted of (63) female students in one of the intermediate schools in Baghdad/Iraq using two equivalents experimental and control groups. The scientific context used was based on the chemistry text book related to the periodic table, (Metals) for the first group of students and Alkaline metals,Nonmetals, Metalloides) for the second group. The research methodology employed consisted of the followings :Measuring students acquisition using (35) issues. The results were verified for their face validity and obtai
... Show More