Root research requires high throughput phenotyping methods that provide meaningful information on root depth if the full potential of the genomic revolution is to be translated into strategies that maximise the capture of water deep in soils by crops. A very simple, low cost method of assessing root depth of seedlings using a layer of herbicide (
The two most popular models inwell-known count regression models are Poisson and negative binomial regression models. Poisson regression is a generalized linear model form of regression analysis used to model count data and contingency tables. Poisson regression assumes the response variable Y has a Poisson distribution, and assumes the logarithm of its expected value can be modeled by a linear combination of unknown parameters. Negative binomial regression is similar to regular multiple regression except that the dependent (Y) variables an observed count that follows the negative binomial distribution. This research studies some factors affecting divorce using Poisson and negative binomial regression models. The factors are unemplo
... Show MoreThe construction industry plays a crucial role in the countries' economy, especially in the developed country. This point encourages the concerned institution to use new techniques and integrate many techniques and methods to maximize the benefits. The main objective of this research is to evaluate the use of risk management, value management, and building information modeling in the Iraqi construction industry. The evaluation process aims at two objectives. The direct objective was to evaluate the knowledge in risk management (RM), value management (VM), and building information modeling (BIM). The indirect objective was to support the participants with information related to the main items mentioned. The questionnaire
... Show MoreDrug consultation is an important part of pharmaceutical care. mobile phone call or text message can serve as an easy, effective, and implementable alternative to improving medication adherence and clinical outcomes by providing the information needed significantly for people with chronic illnesses like diabetes and hypertension particularly during pandemics like COVID-19 pandemic.
Asmari is the main productive reservoir in Abu Ghirab oilfield in the south-east part of Iraq. It has history production extends from 1976 up to now with several close periods. Recently, the reservoir suffers some problems in production, which are abstracted as water production rising with oil production declining in most wells. The water problem type of the field and wells is identified by using Chan's diagnostic plots (water oil ratio (WOR) and derivative water oil ratio (WOR') against time). The analytical results show that water problem is caused by the channeling due to high permeability zones, high water saturation zones, and faults or fracturing. The numerical approach is also used to study the water movement insi
... Show MoreBackground: World Health Organization (WHO) and United Nation International Children Fund (UNICEF) developed a strategy known as Integrated Management of Childhood Illness (IMCI); which aims to reduce less than five years children morbidity and mortality in developing countries.
Objective: To assess the completion of the IMCI format status in primary health care centers, Baghdad.
Methods: A cross sectional study with analytic element was conducted during the period from 15th of January till 15th May 2016 in selected Primary health centers in Baghdad, Iraq. The sample consists of form of child files less than 2 months and form from 2
... Show MoreCompressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp
... Show MoreAs we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,
... Show MoreEye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera
... Show MoreShadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.
Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.