The study was conducted at the fields of the Department of Horticulture and Landscape Gardening, College of Agriculture, University of Baghdad " Abu Ghraib" during the growing seasons 2013-2014 to Evaluate the Vegetative growth , yield traits and genetic parameter of some tomato mutants. Results showed significantly increased of plant height in M6-2 mutant 245cm in Comparison with M6- 3 130 cm . M6-4 mutant significantly increasing of floral clusters 13 . Mutant M6-3 showed significantly increasing the average of, fruit weight 125.9g and plant yield 7.17 kg.plant-1 as comparison with M6-2 which showed decreasing of average of fruit weight and plant yield 79.40g and 4.38 kg.plant-1 respectively. Also results showed the highest Genetic variat
... Show MoreOro slippery tablets (OSTs) is a technique used to improve swallowing of tablets for patients with dysphagia. The aim of this study was to formulate irbesartan and hydrochlorothiazide as Oroslippery tablets (OST) containing 150 mg irbesartan and 25 mg hydrochlorothiazide for dysphagia patients. A simple and rapid method of analysis was developed and validated according to the ICH guideline using HPLC with UV detector. Tablets were prepared by direct compression and then coated with the slippery coat of three different concentrations of the slippering substance “xanthan gum’ (2%, 3% and 4%) in Opadry Colorcone® and evaluated according to USP. Slipperiness test was performed using Albino rabbits. Results showed that 2% xanthan gum gav
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreAbstract: The use of indirect, all-ceramic restorations has grown in popularity among dentists. Studies have demonstrated that for indirect ceramic restorations to be effective over time, cement and ceramic must be bonded in a stable manner. Chemical, mechanical, and laser irradiation are among the methods used to precondition ceramic surfaces in order to increase bond strength.The objective of the study: This study was performed to investigate the roughness values and surface topography of lithium disilicate glass-ceramic treated with conventional methods and different Er,Cr:YSGG, and fractional CO2 laser conditioning parameters.Material and methods:<
... Show MoreBackground: The repair of bone defects remains a major clinical orthopaedic challenge. Bone is a highly vascularised tissue reliant on the close spatial and temporal connection between blood vessels and bone cells to maintain skeletal integrity. This study aimed to study the efficacy of Panax ginseng as a osteoinducer in tibia of rat and as a stimulator for bone healing and to study the immunohistochemical expression of osteonectin as bone formation markers in experimental and control groups during bone healing. Material and method: : In this study thirty albino male rats , weighting (200-300) gram ,aged (2-3) months ,will be used under control conditions of temperature ,drinking and food consumption. The animals will subject for an
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe study was conducted at the fields of the Department of Horticulture and Landscape Gardening,College of Agriculture, University of Baghdad during the growing seasons of 2013- 2014 .forPerformance of Evaluation Vegetative growth and yield traits and estimate some important geneticparameter on seven selected breed of tomato which (S1-S7 ) Pure line. the results found significantdifferences between breeds in all study trails except clusters flowering number .S1 significantly plantlength which reached 227.3 .Also S1,S2 and S4 were significantly increased the number fruit for plant,Fruit weight Increased in S3 ,S6 and plant yield. Increased in S1, S4 ,S5. Genetic variation valueswere low in Floral clusters , TSS and fruit firmest and medium i
... Show More