In order to achieve optimal plant growth and production, essential nutrients must be readily available in adequate quantities and in a balanced proportion to give a good yield, especially broccoli which has health benefits that may not be found in many other plants. For this purpose, this experiment was carried out during the seasons 2019/2020 in the botanical garden of the Department of Biology, College of Science for Women, University of Baghdad, to study the effects of nitrogen and sulphur and their interaction on eight parameters reflecting the overall traits of vegetative growth, yield, and chlorophyll content of broccoli Brassica oleracea L. (var. italic JASSMINE F1 Hybrid). A factorial design with three replicates was used, each with 7 plants treated via foliar spraying. The first factor included three groups; control N0 (distill water spray), N1 (500 mg.l-1 nitrogen), and N2 (1000 mg.l-1 nitrogen). The second factor also included three groups; control S0 (distill water spray), S1 (500 mg.l-1 sulfur), and S2 (1000 mg.l-1 sulfur). We used Urea (CO(NH2)2) as a nitrogen source and zinc sulphate (ZnSO4) as a sulfur source. As for the treatment with nitrogen, the results revealed that N2 treatment caused the significantly highest values in all the studied traits, except for the plant height, where there was no significant difference between N1 and N2. As related to the treatment with sulphur, the results showed that S2 treatment resulted in the significantly highest values of leave area, leave dry weight, and root fresh weight. S2 also caused the highest values, but with no significant differences, of plant height, stem diameter and chlorophyll content index. S1 treatment, on the other hand, caused insignificantly higher values of leave number per plant and main curd weight. Based on the results of the interaction between nitrogen and sulfur, S1N2 treatment resulted in the significantly highest values as compared to all other treatments of all the studied traits, except for the plant height, root fresh weight, and main curd weight. The results presented here may facilitate improvements of Broccoli cultivation with suitable nutrient concentrations for sustainable agriculture. In conclusion, the present study comes up with the following: nitrogen and sulfur and their interaction enhance significantly the growth and production of broccoli.
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreThe research aims to determine the role of functional alienation and its impact on Job Satisfaction in General Motors Company, that were selected to apply the field side being an important company in Iraq, the problem was research with difficulty in employees adapt and their sense of alienation in their work which is reflected negatively on the level of satisfaction with work in company searched. A questionnaire was adopted as the main tool for data collection research which included (31) items distributed on (50) employees in the company selected, on a randomly chosen and based on the statistical program ready by (SPSS). Sample of this study was the most important findings of the research are the weak management of the company i
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MorePsidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More