The seed propagation is the predominant method of Echinacea propagation, which has been criticized for its time-consuming control over the separation factor and the uncertainty of pathogen-free plants produced by this method. The technology of tissue culture has provided multiple opportunities for the production of secondary metabolites continuously without being restricted to a specific season, due to the possibility of controlling the environmental conditions and the components of the nutrient medium needed by the plant. This study was conducted to investigate the effects of salicylic acid as elicitor and tyrosine as precursor on propagation and some secondary compounds production in coneflower in vitro. The result showed the superiori
... Show MoreNew complexes of Al(III) such as [Al (Ura) (Phen) (OH2) Cl ] Cl. 2H2O, [Al(Ura)2(OA)(OH2)Cl].H2O and [Al(Ura)3Cl3]H2O type, where (Ura)=Uracil, (Phen)= 1,10-Phenanthroline monohydrate and (OA)= Oxalic acid dihydrate, were prepared. The elemental microanalysis, FT.IR, electronic spectra, and magnetic susceptibility as well as the conductivity measurements are characterized. For isolated three complexes for six coordinated of Al(III) are proposed with molecular formulas that depend on the nature of (Ura), (Phen) and (OA) present. The suggested molecular structure into all complexes for aluminum ion is octahedral geometries .The antibacterial efficacy was examined from metal salt (AlCl3), ligands and metal complexes into the pathogenic bacteri
... Show MoreAbstract:
The current research included " Diagnosis of the reality of the gap for the requirements of Business Continuity Management System According to International Standard (ISO 22301: 2012) in Midland Refineries Company (Daura Refinery) " , for development of an administrative system for Business Continuity is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others . the international legitimacy (represented by the international organization for standardization (ISO)) remains the basis for matching and commitment , and the importance of the application of Business Continuity Management Syst
... Show MoreThis research aims to determine the concentration of radionuclides in dust samples on the public streets of the small side of Diwaniyah city in Iraq as a result of movements of wheels and cars using the gamma spectra and high purity germanium detector (HPGe) with resolution of (2.3 keV) for energy (1.332 MeV) of cobalt 60Co. Dust samples were collected from the streets Diwaniyah city with (26) samples prepared for measurement. The results of the specific activity concentration of Uranium-238, Thorium-232, Potassium-40 and Cesium-137 were (14.66 ± 0.950, 26.29 ± 2.431, 219.04 ± 15.150 and 11.49 ± 0.876) Bq/kg respectively. The radiation parameters Rae
Granular Pile Anchor (GPA) is one of the innovative foundation techniques, devised for mitigating heave of footing resulting from the expansive soils. This research attempts to study the heave behavior of (GPA-Foundation System) in expansive soil. Laboratory tests have been conducted on an experimental model in addition to a series of numerical modeling and analysis using the finite element package PLAXIS software. The effects of different parameters, such as (GPA) length (L) and diameter (D), footing diameter (B), expansive clay layer thickness (H) and presence of non-expansive clay are studied. The results proved the efficiency of (GPA) in reducing the heave of exp
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show More