Low temperature and high relative humidity in the spring season led to decrease of field emergence ratio and growth in maize. Planting dates and seeds stimulation can be appropriate fix. Field experiment was conducted in the two spring seasons of 2022 and 2023. Randomize complete block design with split-plot arrangement and four replications was used. Planting date treatments (February 15th, March 1st and 15th and April 1st, 15th) were placed in main plots. Seeds stimulation treatments (potassium nitrate 6 mg L-1 + licorice extract 6 g L-1 as well as treatment of soaking with distilled water only) were placed in subplots. Seeds stimulation (potassium nitrate+licorice extract) or planting date of February 15th were superior at traits of fiel
... Show MoreA laboratory experiment was carried out in the laboratories of College of Agricultural Engineering Sciences, University of Baghdad in 2017. Three factors were studied; Sorghum bicolor L. cultivars (Inqath, Rabeh and Buhoth70), primed and unprimed seed, and salt stress (0, 6, 9 and 12 dS.m−1). The aim was to improve germination and seedling growth under salt stress. The results showed significant superiority of Buhoth70 cultivar compared to others, significantly superiority of primed seed compared to the unprimed and significant negative impact as long as increasing levels of salt stress at germination ratio, plumule length, dry seedling weight and seedling vigor index. The interaction between cultivars, priming and salt stress showed that
... Show MoreThe main purpose of this paper is to study feebly open and feebly closed mappings and we proved several results about that by using some concepts of topological feebly open and feebly closed sets , semi open (- closed ) set , gs-(sg-) closed set and composition of mappings.
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreCoconut milk is considered as a natural drink that enhances the immunity and it is enriched by calcium, iron, magnesium and vitamin (C) and it is also safe drink for kids and bacterial anti-oxdant, and it may be used in the natural juices instead of the whole milk (cow milk) which is added to some juices. This study aimed to determine the nutritrnal value and the sensory evaluation properties of the natural orange juice enriched by canned coconut milk &nb
... Show MoreThis paper predicts the resilient modulus (Mr) for warm mix asphalt (WMA) mixtures prepared using aspha-min. Various predictor variables were analyzed, including asphalt cement types, asphalt contents, nominal maximum aggregate sizes (NMAS), filler content, test temperatures, and loading times. Univariate and multivariate analyses were conducted to examine the behavior of each predictor variable individually and collectively. Through univariate analysis, it was observed that Mr exhibited an inverse trend with asphalt cement grade, NMAS, test temperature, and load duration. Although Mr increased slightly with higher filler and asphalt content, the magnitude of this increase was minimal. Multivariate analysis revealed that the rate of change
... Show MorePurpose - This study relies on the descriptive and analytical approach through collecting and analyzing the necessary data, as this approach focuses on polling the opinions of the research sample and its directions, and aims to develop a model that studies the relationship between knowledge creation and organizational ambidexterity in Iraqi private banks and verifying its validity experimentally.
Design / Methodology / Introduction - A survey was conducted through a questionnaire form to collect data from a sample of (113) managers in private commercial banks. In addition, this study used the AMOS program and the ready-to-use statistical program package (SPSS V.25) to test the proposed hypotheses of the t
... Show MoreAbstract
This study aims to identify the social and psychological abuse towards elderly people by others, to identify the difference of social and psychological abuse towards elderly by others according to the variable of gender (male and female). Additionally, to identify the difference of social and psychological abuse towards elderly by determining the one who is responsible of abusing (son, daughter, spouse, etc.). To achieve this aim, the researcher designed a scale to identify the social and psychological abuse towards elderly by others. The results showed that this sample exposed to psychological abuse by different sides due to lacking of powers. Besides, the result showed that there are no signifi
... Show More