465 research outputs found

    The Multigeneic _Rhg1_ Locus: A Model For The Effects on Root Development, Nematode Resistance and Recombination Suppression.

    Get PDF
    Soybean (Glycine max L. Merr.) resistance to populations (HgType) of _Heterodera glycines I._, the soybean cyst nematode (SCN), requires a functional allele at rhg1. An apoptosis-like response in the giant cells formed around the nematode results 24-48 h after feeding commences. This study aimed to identify the role of the three genes within the rhg1 locus, a receptor like kinase (RLK), a laccase and an ion anti-porter. Used were near isogeneic lines (NILs) that contrasted at their rhg1 alleles. Features of the rhg1 locus, the candidate genes and their nascent transcripts and proteins in roots were elucidated. First, evidence for a syntenic gene cluster was found and the effectiveness of SNP probes for distinguishing the homeolog sequence variant on linkage group (Lg) B1 from alleles at the rhg1 locus on Lg G was shown. Analysis of plant s heterozygous at rhg1 showed that the allele for resistance was dominant. The absence of recombination events among the NILs between the RLK and other 2 genes eliminated the possibility of a monogeneic rhg1 locus. Finally, an effect on root development was discovered. A model for multigeneic resistance based on developmental control of root growth including a mechanism for segregation distortion is presented

    A Non-Blind Image Watermarking Method for Copyright Protection

    Get PDF
       في هذا البحث ، تم تقديم طريقة العلامة المائية غير العمياء لحماية حقوق النشر الخاصة بالصور الرقمية الملونة. تعتمد هذه الطريقة على مجموعة من التحويلات الرقمية (DWT ، DCT) في مجال التردد. تعتمد عملية التضمين في هذه الطريقة على تقسيم الصورة المضيفة إلى كتل غير متراكبة 16 × 16 واستخدام مقياس إنتروبيا الحافة لاختيار الكتل المناسبة لعملية التضمين لزيادة عدم الإدراك في النظام المقترح. أما بالنسبة لعملية الاستخراج ، فهي تتم بطريقة تتطلب وجود الصورة الأصلية ولكنها تتبع نفس بروتوكول التضمين لاستخراج العلامة المائية المشفرة المضمنة . و لرفع مستوى الأمان ، تم تطبيق طريقة تشفير هجينة باستخدام الخريطة الفوضوية وترميز الحمض النووي لتشفير العلامة المائية قبل تضمينها. تظهر النتائج التجريبية أن الاختلافات بين الصورة ذات العلامة المائية والصورة الأصلية لا يمكن تمييزها. الطريقة المقترحة قاومت بشكل فعال هجمات معالجة الصور الشائعة.    In this paper, a non-blind watermarking method for protecting the copyright of digital color images is introduced. This method based on the combination of digital transforms (DWT, DCT) in the frequency domain. The embedding process in this method depends on the partition of the host image into 16×16 non-overlapped blocks and the use of edge entropy metric to choose the appropriate blocks for the insertion process for the purpose of increasing the imperceptibility of the proposed system. As for the extraction process, it is carried out in a way that requires the presence of the original image but rather follows the same embedding protocol to extract the embedded encrypted watermark. To raise the security level, a hybrid encryption method using the chaotic map and DNA coding has been applied for encrypting the watermark before embedding it. Experimental results demonstrate that the differences between the watermarked image and the original image are indistinguishable. The proposed method is effectively resisted common image processing attacks

    Encrypting of Text Based on Chaotic Map

    Get PDF
     مقدمة:        نظرًا للتوسع السريع للإنترنت مؤخرًا، أصبح الأمان مشكلة حاسمة عند نقل البيانات الرقمية عبر قنوات غير آمنة. يمكن تطبيق     ذلك من خلال استخدام طرق تشفير يمكن الاعتماد عليها. قدم هذا البحث نظامًا لتشفير النص لإنشاء قواعد بيانات آمنة. طرق العمل:          يستخدم البحث خريطة فوضوية مبنية على خريطة لوجستية نظرا لتطبيقها الواسع في البحث العلمي، حيث يتم استخدام عدة عمليات لتنفيذ نشاط التشفير. أولاً، تم تنسيق النص في مصفوفة ثنائية الأبعاد من الأرقام المحولة إلى متجه. ثانيًا، لإنشاء تسلسل لاستخدامه في عملية التشفير، يتم استخدام النظام الفوضوي. ثالثًا، فرز المتجه الذي تم إنشاؤه من أجل خلط القيم النصية بناءً عليه. تتضمن الخطوة الأخيرة ترميز النص المخفوق باستخدام عملية حسابية. أيضًا، هناك العديد من الخطوات المستخدمة في عملية فك التشفير. في الخطوة الأولى، يتم استخدام نفس الأسلوب الرياضي لفك تشفير النص المشفر بعد إنشاء التسلسل الفوضوي المتطابق. في الخطوة الثانية، يتم تفكيك القيم الممزوجة للحصول على النص الذي تم فك تشفيره. الاستنتاجات:          أظهرت النتائج التجريبية أن الطريقة المقترحة تحصل على قيمة ممتازة للإنتروبي تساوي (0.9955) ومعامل الارتباط يساوي      (-0.0024) وتأثير الانهيار الجليدي يساوي (0.5120) وكذلك النظام المقترح الذي تم فحصه تحت اختبارات NIST حصل على نتائج جيده (> 0.01) وتم فحصها لعدة ملفات أخرى والحصول على نتائج جيدة، من حيث اختبارات وقت التنفيذ، تم تطبيق النظام المقترح في فترة زمنية قصيرة.Background:                         Due to the internet's recent rapid expansion, security has become a crucial issue when transmitting digital data via unsecure channels. This can be applied by employing dependable encryption methods. This research brought forward a text encryption system order to create safe databases. Materials and Methods:         The research uses a chaotic map based on a logistic map Due to its widespread application in scientific research. Several processes are used to carry out the encryption activity. Firstly, the text is formatted in 2D matrix of numbers converted into vector. Secondly, to create a sequence for using it in the encryption process, the chaotic system is employed. Thirdly, sorting the generated vector in order to scramble the text values based on it. The final step involves encoding the scrambled text using a mathematical operation. Also, there are many steps used in the decryption process. In the first step, the same mathematical technique is used to decrypt the encrypted text after the identical chaotic sequence has been generated. In the second step, the scrambled values are descrambled to obtain the decrypted text. Results:        The experimental results demonstrate that the suggested approach obtain an excellent value of entropy equal to (0.9955) and Correlation coefficient equal to (-0.0024) and Avalanche effect equal to (0.5120) as well as the proposed system examined under NIST tests and obtain a good results (>0.01) and examined for multiple other files and obtain a good results, in terms of execution time tests, the proposed system applied in a short amount of time. Conclusion:      The proposed system matched the criteria for encryption techniques in terms of high sensitivity for initial values, high security, high randomizing Whatever text is to be encrypted. Also the proposed system can be applied for real time application due to its Short implementation time

    Role of Microalgae as a Source for Biofuel Production in the Future: A Short Review

    Get PDF
    The continued burning of fossil fuels since the beginning of the last century led to higher emissions of greenhouse gases and thus leads to global warming. Microalgae are one of the most important sources of green hydrocarbons because this type of algae has a high percentage of lipids and has rapid growth, consumes the carbon dioxide in large quantities. Besides, the cultivation of these types of algae does not require arable land. This review aims to explain the suitability of microalgae as a biofuel source depending on the fat content, morphology, and other parameters and their effect on the conversion processes of microalgae oil into biofuels by different zeolite catalytic reactions. It also discusses in detail the major chemical processes that convert microalgae oil to chemical products. This review sheds light on one of the most important groups of microalgae (Chlorella vulgaris microalgae). This review includes a historical overview and a comprehensive description of the structure needed to develop this type of algae. The most important methods of production, their advantages and disadvantages are also deliberated in this work. Copyright © 2021 by Authors, Published by BCREC Group. This is an open access article under the CC BY-SA License (https://creativecommons.org/licenses/by-sa/4.0).

    Statistical Studies of Fading in Underwater Wireless Optical Channels in the Presence of Air Bubble, Temperature, and Salinity Random Variations (Long Version)

    Get PDF
    Optical signal propagation through underwater channels is affected by three main degrading phenomena, namely absorption, scattering, and fading. In this paper, we experimentally study the statistical distribution of intensity fluctuations in underwater wireless optical channels with random temperature and salinity variations as well as the presence of air bubbles. In particular, we define different scenarios to produce random fluctuations on the water refractive index across the propagation path, and then examine the accuracy of various statistical distributions in terms of their goodness of fit to the experimental data. We also obtain the channel coherence time to address the average period of fading temporal variations. The scenarios under consideration cover a wide range of scintillation index from weak to strong turbulence. Moreover, the effects of beam-collimator at the transmitter side and aperture averaging lens at the receiver side are experimentally investigated. We show that the use of a transmitter beam-collimator and/or a receiver aperture averaging lens suits single-lobe distributions such that the generalized Gamma and exponential Weibull distributions can excellently match the histograms of the acquired data. Our experimental results further reveal that the channel coherence time is on the order of 10310^{-3} seconds and larger which implies to the slow fading turbulent channels

    Occurrence of Hysterothylacium Species (Nematoda: Raphidascarididae) from Some Marine Fishes from Iraqi Waters

    Get PDF
    Parasitological investigation of 22 species of marine fishes in territorial Iraqi waters, during the period from October 2019 till September 2020, revealed recording of six different species of Hysterothylacium Ward & Magath, 1917 in different developmental stages. These nematodes including two species in adult stage of Hysterothylacium viz, H. reliquens (Norris & Overstreet, 1975) and Hysterothylacium sp. (females only), two species of fourth larval stages (Hysterothylacium sp. type BH and Hysterothylacium sp. type BI) and two species of third larval stages (Hysterothylacium sp. type BA and Hysterothylacium sp. type BC). Identification of Hysterothylacium sp. was based on female only isolated from Blackfin stonefish Pseudosynanceia melanostigma Day, 1875; Hysterothylacium sp. type BH 4th larval stage isolated from Arabian backspot threadfin Polydactylus mullani (Hora, 1926) and Hysterothylacium sp. type BI 4th larval stage from purple-spotted bigeye Priacanthus tayenus Richardson, 1846; all these parasitic nematodes recorded for the first time in the Arabian Gulf. In addition, 14 fish species are considered as new hosts for Hysterothylacium sp. type BC 3rd larval stage. Description of female Hysterothylacium sp., Hysterothylacium sp. type BH and BI both 4th larval stages are given. The interest record of inverse intestinal caecum in some specimens of 3rd larval stage of Hysterothylacium type BC in some marine fishes of the current study is given

    Occurrence of Hysterothylacium Species (Nematoda: Raphidascarididae) from Some Marine Fishes from Iraqi Waters

    Get PDF
    Parasitological investigation of 22 species of marine fishes in territorial Iraqi waters, during the period from October 2019 till September 2020, revealed recording of six different species of Hysterothylacium Ward & Magath, 1917 in different developmental stages. These nematodes including two species in adult stage of Hysterothylacium viz, H. reliquens (Norris & Overstreet, 1975) and Hysterothylacium sp. (females only), two species of fourth larval stages (Hysterothylacium sp. type BH and Hysterothylacium sp. type BI) and two species of third larval stages (Hysterothylacium sp. type BA and Hysterothylacium sp. type BC). Identification of Hysterothylacium sp. was based on female only isolated from Blackfin stonefish Pseudosynanceia melanostigma Day, 1875; Hysterothylacium sp. type BH 4th larval stage isolated from Arabian backspot threadfin Polydactylus mullani (Hora, 1926) and Hysterothylacium sp. type BI 4th larval stage from purple-spotted bigeye Priacanthus tayenus Richardson, 1846; all these parasitic nematodes recorded for the first time in the Arabian Gulf. In addition, 14 fish species are considered as new hosts for Hysterothylacium sp. type BC 3rd larval stage. Description of female Hysterothylacium sp., Hysterothylacium sp. type BH and BI both 4th larval stages are given. The interest record of inverse intestinal caecum in some specimens of 3rd larval stage of Hysterothylacium type BC in some marine fishes of the current study is given

    Experimental Investigation of Minimum Fluidization Velocity in Three Phase Inverse Fluidized Bed System

    Get PDF
    Minimum fluidization velocity is one of the most important parameters when characterizing the hydrodynamics of a fluidized bed. Experiment studies on the effects of bed height and material density on the minimum fluidization velocity for inverse fluidization beds. Were carried out using a 10 cm diameter cylinder fluidized bed. Two types of particles were tested polyethylene (PE) and polypropylene (PP) bead, each with a density of 966.6, 877.3, 896.4, or 846.2 kg/m3, respectively, Results show that minimum fluidization velocity for tow tested materials was insensitive to bed height and increased with increasing the material density. The minimum fluidization velocity was correlated with dimensionless groups and independent parameters with correlation coefficient is 0.9389
    corecore