A field experiment was conducted during the agricultural season 2017-2018. In the research station of the Ministry of Agriculture AL Rasheed side, and within the activities and researches of the national program to develop wheat cultivation in Iraq, Two factors were experienced in the cultivation of wheat, The first factor is the method of cultivation of five treatments were used: : Treatment of the cultivation of wheat in the plots (B), Treatment of wheat crops on bed with 50 cm width (S1), 60cm (S2), 70cm (S3) and 80cm (S4), The second factor is irrigation levels depletion of 40, 60 and 80% of available water coded as W1, W2 and W3, respectively, The experiment was designed under randomized complete block design (RCBD) with three replicat
... Show MoreThe water quality index is the most common mathematical way of monitoring water characteristics due to the reasons for the water parameters to identify the type of water and the validity of its use, whether for drinking, agricultural, or industrial purposes. The water arithmetic indicator method was used to evaluate the drinking water of the Al-Muthana project, where the design capacity was (40000) m3/day, and it consists of traditional units used to treat raw water. Based on the water parameters (Turb, TDS, TH, SO4, NO2, NO3, Cl, Mg, and Ca), the evaluation results were that the quality of drinking water is within the second category of the requirements of the WHO (86.658%) and the first category of the standard has not been met du
... Show MoreBefore users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra
... Show MoreThe pancreatic ductal adenocarcinoma (PDAC), which represents over 90% of pancreatic cancer cases,
has the highest proliferative and metastatic rate in comparison to other pancreatic cancer compartments. This
study is designed to determine whether small nucleolar RNA, H/ACA box 64 (snoRNA64) is associated with
pancreatic cancer initiation and progression. Gene expression data from the Gene Expression Omnibus (GEO)
repository have shown that snoRNA64 expression is reduced in primary and metastatic pancreatic cancer as
compared to normal tissues based on statistical analysis of the in Silico analysis. Using qPCR techniques,
pancreatic cancer cell lines include PK-1, PK-8, PK-4, and Mia PaCa-2 with differ
The present paper, practical methods of professional translation, discusses the most important methods to achieve an accurate effective translation from the source language text to the equivalent target language text.
The present study suggests that practical translation like any literary activity is of six main stages that follow sequential order to achieve an accurate translation: (choosing the foreign text to be translated, the author of the text permission, the text translation, considering the title contextual meaning, reviewing the text translation, and finally finding a good publisher).
چکیده
پژوهش حاضر که با عنوان گامهای عملی یک ترجمهء حر
... Show MoreThe issue of human rights occupies great importance on the academia as well as in the reality, especially after the spread of ideas related to these rights on one hand and the large number of violations they are exposed to on the other hand, which makes it necessary to develop fundamental solutions to the remove the obstacles of implementing human rights.
In this research entitled (The Legal Basis of the Right to the City: A Comparative Study) we dealt with a new concept of human rights and discussed the basis upon which it is based in international charters, constitutions and domestic laws.
Adverse drug reactions (ADR) are important information for verifying the view of the patient on a particular drug. Regular user comments and reviews have been considered during the data collection process to extract ADR mentions, when the user reported a side effect after taking a specific medication. In the literature, most researchers focused on machine learning techniques to detect ADR. These methods train the classification model using annotated medical review data. Yet, there are still many challenging issues that face ADR extraction, especially the accuracy of detection. The main aim of this study is to propose LSA with ANN classifiers for ADR detection. The findings show the effectiveness of utilizing LSA with ANN in extracting AD
... Show MoreIn this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the
... Show More