Studies were conducted to screen eight sunflower (Helianthus annuus L.) genotypes for their allelopathic potential against weeds and wheat crop, which customarily follows sunflower in Iraq. All sunflower genotypes significantly inhibited the total number and biomass of companion weeds and the magnitude of inhibition was genotype dependent. Among the eight genotypes tested, Sin-Altheeb and Coupon were the most weed-suppressing cultivars, and Euroflor and Shumoos were the least. A subsequent field experiment indicated that sunflower residues incorporated into the field soil significantly inhibited the total number and biomass of weeds growing in the wheat field. Sunflower genotypes Sin-Altheeb and Coupon appeared to inhibit total weed number and biomass more and significantly increased wheat yield compared with the least-suppressive genotypes (Euroflor and Shumoos). Chromatographic analyses by HPLC revealed the presence of 13 secondary metabolites in residues of the tested sunflower genotypes. All the isolated compounds appeared to be phenolic, with the exception of terpinol, which is a terpenoid derivative. The total concentration of Phytotoxins (phenolic compounds) was found to be higher in the most-suppressive potential genotypes compared with the least-suppressive genotypes.
Background: COVID-19 is an ongoing disease that caused, and still causes, many challenges for humanity. In fact, COVID-19 death cases reached more than 4.5 million by the end of August 2021, although an improvement in the medical treatments and pharmaceutical protocols was obtained, and many vaccines were released. Objective: To, statistically, analyze the data of COVID-19 patients at Alshifaa Healthcare Center (Baghdad, Iraq). Methods: In this work, a statistical analysis was conducted on data included the total number, positive cases, and negative cases of people tested for COVID-19 at the Alshifaa Healthcare Center/Baghdad for the period 1 September – 31 December 2020. The number of people who got the test was 1080, where 424 w
... Show MoreThis research aims to assess the adoption of TQM in the Middle East Bank for Investment, and diagnosis means and techniques of technological innovation that applied in, as well as to determine the nature of the relationship between total quality management practices (operations management, employment relations, customer relations) and technological innovation (the incremental innovation of the service, incremental innovation process, a radical innovation of the service, a radical innovation of the operation), through use the checklists, derived from a study (Kim et al, 2012) the many styles of mathematical and statistical tools was adopted like the percentage, mean, duplicates, as well as the adoption of the Z test th
... Show More<span lang="EN-US">The need for robotics systems has become an urgent necessity in various fields, especially in video surveillance and live broadcasting systems. The main goal of this work is to design and implement a rover robotic monitoring system based on raspberry pi 4 model B to control this overall system and display a live video by using a webcam (USB camera) as well as using you only look once algorithm-version five (YOLOv5) to detect, recognize and display objects in real-time. This deep learning algorithm is highly accurate and fast and is implemented by Python, OpenCV, PyTorch codes and the Context Object Detection Task (COCO) 2020 dataset. This robot can move in all directions and in different places especially in
... Show MoreBackground Parkinson’s disease (PD) is currently the fastest-growing neurological disorder in the world. Patients with PD face numerous challenges in managing their chronic condition, particularly in countries with scarce healthcare infrastructure. Objective This qualitative study aimed to delve into neurologists’ perspectives on challenges and gaps in the Iraqi healthcare system that influence the management of PD, as well as strategies to mitigate these obstacles. Method Semi-structured interviews were conducted with neurologists from five different Iraqi provinces, working in both hospitals and private neurology clinics, between November 2024 and January 2025. A thematic analysis approach was employed to identify the main challenge
... Show MoreWhat distinguishes the athlete in dealing with all stimuli is the ability to understand the cognitive rules through which he acts and directs behavior through thinking and regular planning methods in dealing with the environment in a realistic manner, and this comes through techniques and means based on modernity in obtaining information that makes the athlete arrange in His memory is the programs that are the most important crutch for relying on when he asks for them in applying and executing the skill assignment. One of the enhancers of awareness of variables is the ability of coaches to provide openness in modern ideas to find solutions, through which the player can sense and interpret events and produce outputs for quick and successful
... Show MoreA tunable band pass filter based on fiber Bragg grating sensor using an in-fiber Mach-Zender interferometer with dual micro-cavities is presented. The micro-cavity was formed by splicing together a conventional single-mode fiber and a solid core photonic crystal fiber (SCPCF) with simple arc discharge technique. Different parameters such as arc power, length of the SCPCF and the overlap gap between samples were considered to control the fabrication process. The ellipsoidal air-cavity between the two fibers forms Fabry-Perot cavity. The diffraction loss was very low due to short cavity length. Ellipsoidal shape micro-cavities were experimentally achieved parallel to the propagation axis having dimensions of (24.92 – 62.32) μm of width
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More