Identification of pathogens and locating their inocul¬um source (S) are the first strategies toward successful disease management program the pretransplating seedl¬ing damping - off problem on vegetable crops was found to be caused by Pythium aphanidermatum and Rhizocto¬nia solani. Both fungi were isolated from peat (moss) for the first time in Iraq. In addition, considerable num¬ber of pathogenic fungi was found as contaminants in soil samples from Alrashidiah vegetable covered farming station. Among the isolated fungi were: Pythium apha¬nidermatum, Rhizoctonia solani, Sclerotinia sclerotiorum, Fusarium oxysporum, Fusarium solani phialophora spp., Cephalisporium spp Rizopus stolonfier and Botrytis cine¬rea, in addition to several of other folair pathogens Econo¬mic important diseases such as vascular wilt, stem and root rots, blight and fruit rots were found to be caused by those fungi on tomato, cucumber, cucurbit, eggplant and pepper plants that were grown at Alrashidiah. The results suggest that chemical, physical and / or biological treatments should be urgently applied for profitable vegetable growing at this station.
This research study the effect of Titanium dioxide on the tensile properties of
Polystyrene (PS) and Polycarbonate (PC) polymers. The stress – strain curve for pure PS
and pure PC, shows that Young modulus for PS is higher than Young modulus for PC,
because PS have higher ultimate strength than PC.
The addition of TiO2 to PS and PC will reduce the Young modulus and ultimate stress,
because the TiO2 particles will reduces or freeze the orientation of these molecular chain
and reduced the toughness of PC, while when the TiO2 were added to PS, the value of
toughness will be stabilized because TiO2 particles make these chains interlocked and the
mobility of the chains will be restrict.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
A modified Leslie-Gower predator-prey model with a Beddington-DeAngelis functional response is proposed and studied. The purpose is to examine the effects of fear and quadratic fixed effort harvesting on the system's dynamic behavior. The model's qualitative properties, such as local equilibria stability, permanence, and global stability, are examined. The analysis of local bifurcation has been studied. It is discovered that the system experiences a saddle-node bifurcation at the survival equilibrium point whereas a transcritical bifurcation occurs at the boundary equilibrium point. Additionally established are the prerequisites for Hopf bifurcation existence. Finally, using MATLAB, a numerical investigation is conducted to verify the va
... Show MoreThis study discusses risk management strategies caused by pandemic-related (Covid-19) suspensions in thirty-six engineering projects of different types and sizes selected from countries in the middle east and especially Iraq. The primary data collection method was a survey and questionnaire completed by selected project crew and laborers. Data were processed using Microsoft Excel to construct models to help decision-makers find solutions to the scheduling problems that may be expected to occur during a pandemic. A theoretical and practical concept for project risk management that addresses a range of global and local issues that affect schedule and cost is presented and results indicate that the most significant delays are due to a
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
The purpose of present work is to study the relationship of the deformed shape of the nucleus with the radioactivity of nuclei for (Uranium-238 and Thorium-232) series. To achieve our purposes we have been calculated the quadruple deformation parameter (β2) and the eccentricity (e) and compare the radioactive series with the change of the and (e) as indicator for the changing in the nucleus shape with the radioactivity. To obtain the value of quadruple deformation parameter (β2), the adopted value of quadruple transition probability B (E2; 0+ → 2+) was calculated from Global Best fit equation. While the eccentricity (e) was calculated from the values of the minor and major ellipsoid axis’s (a & b). From the results, it is obvi
... Show MoreThis article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.
The study aims to investigate the relationship between the gender diversity of board director, the accounting conservatism and firm value in Iraqi firms. The sample was represented by 30 Iraqi firms listed on the Iraqi market over the period 2017. The research was based on the main hypothesis that gender diversity has a positive relationship with conservatism and firm value, that conservatism as an intermediate variable will enhance the positive relationship between gender diversity and firm value. The study reached results that support the research hypotheses. The appointment of females to the board helps improve the provision of conservative accounting information and avoids overstate when reporting earnings. Based on these res
... Show More