Xanthomonas axonopodis pv glycines (Xag) is a pathogen that causes pustule disease in soybeans. Many
techniques for controlling this disease have been widely developed, one of which is the use of biological agents.
Bacillus sp. from the soybean phyllosphere is a biological agent that has the potential to suppress the
development of pustule disease. One of the biological control mechanisms is through biochemical induction
of plant resistance which includes the accumulation of phenols, salicylic acid compounds, and peroxidase
enzymes. Bacillus subtilis JB12 and Bacillus velezensis ST32 are two bacteria isolated from the soybean
phyllosphere which have previously been known to suppress Xag through an antibiosis mechanism. This study
aimed to determine the potential of Bacillus subtilis JB12 and Bacillus velezensis ST32 in inducing soybean
resistance against Xag infection. This research was carried out in two stages, the induction of resistance to
soybean germination and an experiment in a greenhouse. This study consisted of 4 treatments and 5
replications, including P0 (Xag inoculation), P1 (Bacillus subtilis JB12 inoculation), P2 (Bacillus velezensis
ST32), and P3 (Bacillus subtilis JB12 + Bacillus velezensis ST32 inoculation). Observations were made on
the content of phenolic compounds, peroxidase enzyme activity, and the development of soybean pustule
disease. The results showed differences in phenol content and peroxidase activity at the two stages of the study.
Seed treatment with both isolates of Bacillus sp was able to increase the phenol content of soybean sprouts up
to 3 - 5 days after inoculation (dai). Phenol content then decreased and was followed by an increase in the
peroxidase activity up to 7 dai. The application of Xag and two isolates of Bacillus sp. in soybean plants caused
the phenol content to fluctuate and peroxidase activity to decrease. Bacillus subtilis JB12 in general played a
better role in increasing phenol content and peroxidase enzyme activity in soybean than Bacillus velezensis
ST32. The application of two isolates of Bacillus sp. was not able to prolong the incubation period and reduce
the severity of the pustule disease 14 days after inoculation.
This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Maximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show MoreIn this paper, a new class of nonconvex sets and functions called strongly -convex sets and strongly -convex functions are introduced. This class is considered as a natural extension of strongly -convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly -convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly -convex.
This research considers a proposed mechanism relying on frictional interactions between the grasped object and the gripper, thus attaining a case of self-locking condition for a tendon type robotic gripper. A mathematical model was derived for this proposed mechanism, upon which a special purpose apparatus was fabricated and tested. Both results, theoretically and experimentally, are in good agreement, showing that the weight of the grasped object played a major role in attaining the self-locking condition.
Background: The estimation of ferritin and related variables by complete serum iron profile, for Iraqi hashimoto’s patients to see the effect of thyroid hormone insufficiency, which may lead to deficiency of ferritin iron stores, this may be quite useful during the diagnosis and treatment of hashimoto’s patients. Patients and Method: The study was performed at National Center of Teaching laboratories of Medical city institute in Baghdad. Fifty newly diagnosed patients with hashimoto’s and forty apparently healthy controls. Diagnosis based on thyroid profile analysis including:Thyroid Stimulating Hormone (TSH), Thyroxine (totalT4) and Triiodothyronine (total T3), estimation of antibodies against thyroperoxidase, iron profile including:
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreIn 1939, the Japanese scientist Michio Takaoka first mentioned resveratrol from Veratrum grandiflorum O. Loes. Majority of plants, such as grapes, berries, and peanuts, are significant sources of resveratrol, a well-known polyphenolic. resveratrol (RV) is noted for its links to several health care benefits, including glucose metabolism, anti-aging, cardioprotective, neuroprotective, antitumor, antidiabetic, and antioxidant effects. Importantly, there have been reports of promising therapeutic qualities in atherosclerosis, dementia, and various malignancies. These properties are controlled through a number of cooperative techniques, which control inflammation besides the effects of oxidative stress and cell death. However, circulating resver
... Show More