An experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of vegetative and flowery growth in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1 = cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses) by using RCBD with three replications. Three parameters model with chi square test and six parameters model were used to estimate the type of gene effects , in breeding depression , components of genetic variance , mean degree of dominance , heritability and expected gain due to selection. The results showed that dominance and epistatic (additive x additive) and (dominance x dominance) effects were great importance than additive effects in most traits of all crosses. In breeding depression was important except for plant length . Broad-sense heritability ranged from 51.68 – 90.25% for plant length in crosses 3 , 5 and 6 while narrow – sense heritability was high (76.6 and 83.9%) for No. of leaves in crosses , 2,5 respectively and (57.13%) for No. of Nodes to first female flower in cross 6. Expected gain due to selection among F2 was agreat (29.5%) for No. of leaves in cross 5 while it was low to moderate some traits in other crosses
This study aims at examining and confirming the patterns of phenetic relationships and the levels of variations within and among the species of Lotus L., 1753 in Egypt by using morphometric analysis techniques. We have evaluated 24 morphological characters from about 300 herbarium specimens representing 19 species of Lotus that are currently recognized. Based on numerical analyses of macromorphological characters (cluster analysis, principal coordinate analysis and principal component analysis), 19 species of Lotus were recognized from Egypt. These species were clustered in six species-specific groups: (I) Lotus halophilus Boiss. & Spruner, L. angustissimus L., L. glinoides Delile and L. schimperi Steud. ex Boiss., (II) Lotus glaber
... Show MoreAfter the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of
Six isolates of A. pullulans were collected from many sources including Hibiscus sabdariffa (Roselle), old Roofs of houses and bathroom surface that referred as Ap ros1, Ap or2, 3, 4 and Ap bs5, 6 respectively, all these isolates were identified based on morphological characteristics and nutritional physiology profiles, all were able to utilize various carbon and nitrogen sources such as glucose, xylose, sucrose, maltose, ammonium sulfate, ammonium nitrate and ammonium chloride, also they showed positive test for starch and amylase, while α-cellulose, ethanol, and methanol were could not be ass
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe study aimed to investigate the effect of fungicides chlorothalonil at different concentrations ( 0.1 , 0.5 , 5 , 25 , 50 ) × 10 - 5 M on some cytogenetic parameters of human peripheral blood lymphocytes . The genotoxicity parameters were estimated by the number of chromosomal aberrations (CAs) and their types and by estimating the induced micronuclei (Mn) . Cytotoxic effect recorded by estimating the mitotic index (MI) . Results revealed that the fungicide increased the CAs in dose – response pattern with positive correlation coefficient ( r = + 0.964) , there was a significant differences among the concentrations (P<0.01) . The major CAs records chromosomal breakage at concentrations. 0.5 , 5 , 25 , and 50 , while the lowest concen
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreOccupy public investment spending, a great deal of attention since the thirties of the last century, to play important role in economic and social development process and therefore most of the countries are trying different degree of economic development to the completion of the largest amount of public investment, especially in infrastructure, which is one of the pillars essential to economic development, and in order to maximize utilization of the completion of public investment should focus on achieving efficiency in completion.
The current reality of public projects in Iraq, indicating the absence of several key characteristics that must be provided if these proje
The vision and philosophy of the economic system in Iraq after 2003 were not clear-cut because of overlapping internal factors was the novelty of the political system and the lack of political and economic decision makers to understanding and conviction full need shaping a new administration for the Iraqi economy is able to succeed economic development programs, and external factors was determinedly organizations international application of shock reforming style and contrary to the social reality and the security which reflected negatively on the work and consistency Lisseeash financial balance between stability and growth and raise the level of consumer spending and the importance of r
... Show More