The seed propagation is the predominant method of Echinacea propagation, which has been criticized for its time-consuming control over the separation factor and the uncertainty of pathogen-free plants produced by this method. The technology of tissue culture has provided multiple opportunities for the production of secondary metabolites continuously without being restricted to a specific season, due to the possibility of controlling the environmental conditions and the components of the nutrient medium needed by the plant. This study was conducted to investigate the effects of salicylic acid as elicitor and tyrosine as precursor on propagation and some secondary compounds production in coneflower in vitro. The result showed the superiority of 2 mg / liter SA over the other treatments, which gave the highest average number of branches formed reaching 33.6 branches / plant part, number of leaves 33.6 leaves/vegetable part, fresh 1.067g and dry 0.058g weights as well as echinacoside concentration of 291.3427 μg / g DW. However, the treatment 100 mg/l tyrosine gave a maximum of average number of branches 11.80 branches / plant part, number of leaves 11.80 leaves/vegetable part, fresh and dry weight 0.152 and 0.023 g respectively. Concerning echinacoside value, its maximum 318.5203 μg / g DW was recorded with 150 mg/l tyrosine. From this study, we concluded that caffeic acid derivatives such as echinacosides are one of the main phytochemical components of Echinacea extracts. The system of cell culture is a tool for the large-scale, year-round culture of plant cells, so it is a continuous source for the production of active compounds
The research aims to identify the role of organizational identity in improving work teams, and to suggest ways to deal with the outputs of work teams in a way that achieves the goals of the Baghdad Traffic Directorate as it is the subject of the application of the research, while the research community was represented by its officers, while the research sample was embodied in (General Director, Associate The Director General, the directors of Rusafa and Karkh traffic and their assistants, as well as the heads of the divisions and the officials of the departments) in it. The sample was (200) observations. The descriptive exploratory approach was devoted to conducting the research, relying on the questionnaire in data collection, as well as e
... Show MoreThe study dosage ethanol in the total content of acid sialic TC and acid sialic associated fat (LBSA) in blood serum and congener brain Dkor Jerd eggs study included dosage 20 animals of male rat Ald ethanol daily for a period of four weeks and concentrations 20% and 30%, 40%, 50% and size of dose 5mlThe results of the study showed that levels of TSA homogeneous in the brain and blood serum significantly reduced Ankhvaza
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThe most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the
... Show MoreThe research aims to show the dimensions of organizational trust represented by (administrative policies opportunities for innovation and self innovation and self- realization,availability of information,prevailing organizational values) and its reiationship to achieving the strategic position of banks represented by formation of expectations,buiiding networks,learning operations As the research was applied in each of the banks (middle east)Iraqi investment,Al-Ahly Iraqi, Business Bay, Al- Mansour investment bank),the qusestionnaire was adopted as a tool to collect data and information from the sample number (138)who are in the site (department director, division ,M.division director ,division officer, unit officer)the statistica
... Show MoreAqueous extract of poppy plant) Papaver nudicaule) with five concentrations (50, 100, 150, 200 and 250) mg/l were used to anesthetize fingerlings of the common carp Cyprinus carpio (Mean total length 8.91 ± 0.31 cm and mean total weight 7.72 ± 1.19 gm) instead of the traditional use of MS-222. Results showed that extracted solution of poppy have partial and overall anesthesia effect on these fishes with inverse relationship between the concentrations used and the time needed to reach partial and overall anesthesia, and also direct relationship between concentrations used and time needed for fish recovery. Best results were obtained by using a concentration of 250 mg/l, where time for partial anesthesia was 8 ± 1.52 m
... Show MoreThe current study examined the impact of using PowerPoint presentation on EFL student’s attendance, achievement and engagement. To achieve the aim of this study, three null hypotheses have been posed as follows: There is no statistically significant difference between the mean score of the experimental group attendance and that of the control one; there is no statistically significant difference between the mean score of the experimental group achievement and that of the control one, and there is no statistically significant difference between the mean score of the experimental group engagement and that of the control one. To verify a hypothesis, a sample of sixty students is chosen randomly from the third year, department of English,
... Show More
This work focuses on the implementation of interfaces for human machine interaction (HMI) for control and monitor of automatic production line. The automatic production line which can performance feeding, transportation, sorting functions.
The objectives of this work are implemented two SCADA/HMI system using two different software. TIA portal software was used to build HMI, alarm, and trends in touch panel which are helped the operator to control and monitor the production line. LabVIEW software was used to build HMI and trends on the computer screen and was linked with Micros
... Show MoreThe current world seeks to supply the most of the fruits of human knowledge and tries hard to search for the most important scientific facts, programs, means and advanced devices in various fields, including the sports field, and among these means is the use of various and advanced training devices and programs for the purpose of achieving the desired goal, which is to reach the desired level, the basketball game is one of the sports that need high technology in training according to scientifically studied principles because it is one of the games that relate to the abundance of its variables, composition and speed of change, all of which require a technical and high training depth and the players ’possession of different physical charact
... Show MoreSteganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show More