Nitrogen (N) is a key growth and yield-limiting factor in cultivated rice areas. This study has been conducted to evaluate the effects of different conditions of N application on rice yield and yield components (Shiroudi cultivar) in Babol (Mazandaran, Iran) during the 2015- 2016 season. A factorial experiment executed of a Randomized Complete Block Design (RCBD) used in three iterations. In the first factor, treatments were four N amounts (including 50, 90, 130, and 170 kg N ha-1), while in the second factor, the treatments consisted of four different fertilizer splitting methods, including T1:70 % at the basal stage + 30 % at the maximum tillering stage, T2:1/3 at the basal stage + 1/3 at the maximum tillering stage + 1/3 at the panicle initiation, T3: 25 % at the basal stage + 50 % at the maximum tillering stage + 25 % at the panicle initiation, and T4: 25 % at the basal stage + 25 % at the maximum tillering stage + 50 % at the panicle initiation. The results illustrate only the number of panicles (m2) which was significantly impacted by the year (at the CI of 0.99). Different levels of N had effects on the panicle length, the percentage of filled grain (PFG), whole grain in a plant, and yield (at the CI of 0.95). The panicle length, the PFG, and yield were also significantly affected by different methods of N splitting (at the P-v of 0.01). The interaction of N amount × N splitting had a significant effect on the panicle length, the PFG, and yield (at the CI of 0.95). In general, the most significant impact on the panicle length, the number of panicles (m2), the whole plant's grain, and yield observed after using 130 kg N ha-1. Besides, T3 showed the most notable effect on all the studied indices except for the panicle length.
A particulate composite material was prepared by adding the Titanium dioxide (TiO2) with a particle size of (75-150) µm to Epoxy resin at weight percentage of (10%,20%,30%,40%,50%).The following some mechanical properties were studied,fracture toughness, hardness.casting preparation methods were used in this study includes preparing plate of matrix and composites. specimens were prepared according to ASTM for the Mechanical properties tests. After that Another samples were heat treated for three and six hour at 65C?. Fracture toughness (Kic) represent for stress intensity factor results were showed that the curve of three hours aging increases in fracture toughness (Kic) for composites but for six hours aging increases fracture tough
... Show MoreKHalaf Alhmar and what we get from his poem
Physicians are infrequently selected to serve in the yearlong role of Jefferson Science Fellow (JSF) as senior science advisor for the US Department of State or the United States Agency for International Development. The authors discuss the role of a JSF in promoting “science diplomacy” from the perspective of one alumnus, who sites examples of ongoing, long-term collaborative projects including one focusing on medical education reform in Iraq that would not have been possible without the JSF program. More than 3 decades of political and social unrest, terrorism, the internal displacement of millions of Iraqi citizens, the arrival of Syrian refugees, international sanctions, and the effect of fluctuating oil prices that fund education i
... Show MoreIn this study, a fast block matching search algorithm based on blocks' descriptors and multilevel blocks filtering is introduced. The used descriptors are the mean and a set of centralized low order moments. Hierarchal filtering and MAE similarity measure were adopted to nominate the best similar blocks lay within the pool of neighbor blocks. As next step to blocks nomination the similarity of the mean and moments is used to classify the nominated blocks and put them in one of three sub-pools, each one represents certain nomination priority level (i.e., most, less & least level). The main reason of the introducing nomination and classification steps is a significant reduction in the number of matching instances of the pixels belong to the c
... Show MoreBackground: Pyogenic discitis most frequently occurs
after home delivery, hemorridectomy, and dilatation and
curettage. Discitis is generally due to blood borne bacterial
invasion of the disc from adjacent end-plate via
communicating vessels. Infective discitis remains an
uncommon, but potentially serious cause for back pain.
Delayed diagnosis can occur and a high index of suspicion
may occur.
Methods: The study included 30 patients suffering from
localized low back pain with limitation of movement.
Diagnosis was made by history, physical examination and
investigation mainly E.S.R and MRI.
Results: 50.3% of patient with discitis had a history of
vaginal delivery, 15% had a history of hemorridectomy
Agent technology has a widespread usage in most of computerized systems. In this paper agent technology has been applied to monitor wear test for an aluminium silicon alloy which is used in automotive parts and gears of light loads. In addition to wear test monitoring، porosity effect on
wear resistance has been investigated. To get a controlled amount of porosity, the specimens have
been made by powder metallurgy process with various pressures (100, 200 and 600) MPa. The aim of
this investigation is a proactive step to avoid the failure occurrence by the porosity.
A dry wear tests have been achieved by subjecting three reciprocated loads (1000, 1500 and 2000)g
for three periods (10, 45 and 90)min. The weight difference a
In the South of yement, when the accupation of Aden in 1839 by the British, British politics has proceeded in accordance with interests in promoting the existence and exploitation of this important site to implement their interests. Historians believe that Britain played a major role in the conflicts that have taken place on the land of Yemen, through a series of military and political dealings between them and the Ottoman Empire prior to withdrawal of Yemen and between local authorities and power to Yemen, such interactions have led to very serious consequences for the future of Yemen and Yemen was often divided into three parts, the northern areas under the authority of Imam Yahya, and the South, under the control of Britain, Asir and
... Show MoreThe theory of probabilistic programming may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, production and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More