Preferred Language
Articles
/
jeasiq-225
Estimate missing value by use analyses of covariance method for split block-design
...Show More Authors

The research aims to estimate missing values using covariance analysis method Coons way to the variable response or dependent variable that represents the main character studied in a type of multi-factor designs experiments called split block-design (SBED) so as to increase the accuracy of the analysis results and the accuracy of statistical tests based on this type of designs. as it was noted in the theoretical aspect to the design of dissident sectors and statistical analysis have to analyze the variation in the experience of experiment )SBED) and the use of covariance way coons analysis according to two methods to estimate the missing value, either in the practical side of it has been implemented field experiment wheat crop in rice research station in the city of Mashkhab affiliated to the Department of Agricultural Research / ministry of agriculture it was the experiment with three replications by 36 treatment Area ( 15 square meters each treatment) it has been cultivating first date (15/11/2015) and the second deadline (1/12/2015) and the third deadline (1/12/2015) class grist (aebaa 99) The four seed rates (30/40/50/60) Kg per acre according to Split-block design And as such represents a study winning weight (grains of wheat) as a variable response (Y) data were analyzed using the program (MATLAP) and using equations and formulas in the theoretical side. And ensure the application of the practical side estimate missing values using analysis of covariance in accordance with the design of dissident sectors in two ways and analyze the variation of the recipe studied ((y weight of the crop wheat cereal tons / ha after estimating the lost value.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Synthesis, Characterization, and Thermal Analysis of a New Acidicazo Ligand's Metal Complexes
...Show More Authors

The researchers wanted to make a new azo imidazole as a follow-up to their previous work. The ligand 4-[(2-Amino-4-phenylazo)-methyl]-cyclohexane carboxylic acid as a derivative of trans-4-(aminomethyl) cyclohexane carboxylic acid diazonium salt, and synthesis a series of its chelate complexes with metalions, characterized these compounds using a variety technique, including elemental analysis, FTIR, LC-Mass, 1H-NMRand UV-Vis spectral process as well TGA, conductivity and magnetic quantifications. Analytical data showed that the Co (II) complex out to 1:1 metal-ligand ratio with square planner and tetrahedral geometry, respectively while 1:2 metal-ligand ratio in the Cu(II), Cr(III), Mn(II), Zn(II), Ru(III)and Rh(III)complexes

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Semi-Analytical Assessment of Magneto-Hydrodynamic Nano-Fluid Flow Jeffrey- Hamel Problem
...Show More Authors

In this paper, analyzing the non-dimensional Magnesium-hydrodynamics problem Using nanoparticles in Jeffrey-Hamel flow (JHF) has been studied. The fundamental equations for this issue are reduced to a three-order ordinary differential equation. The current project investigated the effect of the angles between the plates, Reynolds number, nanoparticles volume fraction parameter, and magnetic number on the velocity distribution by using analytical technique known as a perturbation iteration scheme (PIS). The effect of these parameters is similar in the converging and diverging channels except magnetic number that it is different in the divergent channel. Furthermore, the resulting solutions with good convergence and high accuracy for the d

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Jul 28 2018
Journal Name
Journal Of Engineering
Experimental and Numerical Analysis of Expanded Pipe using Rigid Conical Shape
...Show More Authors

The experimental and numerical analysis was performed on pipes suffering large plastic deformation through expanding them using rigid conical shaped mandrels, with three different cone angles (15◦, 25◦, 35◦) and diameters (15, 17, 20) mm. The experimental test for the strain results investigated the expanded areas. A numerical solution of the pipes expansion process was also investigated using the commercial finite element software ANSYS. The strains were measured for each case experimentally by stamping the mesh on the pipe after expanding, then compared with Ansys results. No cracks were generated during the process with the selected angles. It can be concluded that the strain decreased with greater angles of con

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Impact of Twitter Sentiment Related to Bitcoin on Stock Price Returns
...Show More Authors

Twitter is becoming an increasingly popular platform used by financial analysts to monitor and forecast financial markets. In this paper we investigate the impact of the sentiments expressed in Twitter on the subsequent market movement, specifically the bitcoin exchange rate. This study is divided into two phases, the first phase is sentiment analysis, and the second phase is correlation and regression. We analyzed tweets associated with the Bitcoin in order to determine if the user’s sentiment contained within those tweets reflects the exchange rate of the currency. The sentiment of users over a 2-month period is classified as having a positive or negative sentiment of the digital currency using the proposed CNN-LSTM

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Jan 29 2018
Journal Name
Iraqi Journal Of Science
Phylogenetic analysis of cpn60 gene from locally isolated Acinetobacter baumannii
...Show More Authors

This study was aimed to analysis phylogenetic tree of the gene cpn60 in Acinetobacter baumannii that was identified in Baghdad. Study included collection two hundred specimens (fifty from UTI, fifty from wound infection , fifty from respiratory tract infection and fifty from otitis infections) . In primary laboratory diagnosis and confirmed by using VITEK- 2 Compact system, twenty isolates of this bacterium were indentified (10%) from total specimens. Extraction of geneteic material to detect target gene by amplification this target gene. DNA
sequencing of all isolates was done. Then alignment of sequencing in NCBI and draw phylogenetic tree by use Geneious 9 software among sequence of locally i

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering
Numerical Simulation of Thermal-Hydrodynamic Behavior within Solar Air Collector
...Show More Authors

Solar collectors, in general, are utilized to convert the solar energy into heat energy, where it is employed to generate electricity. The non-concentrating solar collector with a circular shape was adopted in the present study. Ambient air is heated under a translucent roof where buoyant air is drawn from outside periphery towards the collector center (tower base). The present study is aimed to predict and visualize the thermal-hydrodynamic behavior for airflow under inclined roof of the solar air collector, SAC. Three-dimensional of the SAC model using the re-normalization group, RNG, k−ε turbulence viscus model is simulated. The simulation was carried out by using ANSYS-FLUENT 14.5. The simulation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Review Of International Geographical Education Online
Quality of Transition to E-Learning under Corona pandemic: An Application Study in College of Administration and Economics, Baghdad University
...Show More Authors

E-learning is a lifeline for the educational process, which contributed to the sustainability of working educational organizations and prevented them from stopping, so the study came to measure the compatibility between E-learning quality dimensions (information technology, educational curricula, teaching methods, and intellectual capital of educational institution) as an independent variable, and educational services quality dimensions represented by (safety, tangibility, reliability and Confidence) as a dependent variable. The sample was 150 teachers was drawn from the College of Administration and Economics community of 293 teachers through the use of several statistical methods to measure the degree of correlation and impact between the

... Show More
Scopus
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Environmental Engineering And Science
Fenton-like degradation of direct blue dye using green synthesised Fe/Cu bimetallic nanoparticles
...Show More Authors

This study relates to synthesis of bentonite-supported iron/copper nanoparticles through the biosynthesis method using eucalyptus plant leaf extract, which were then named E-Fe/Cu@B-NPs. The synthesised E-Fe/Cu@B-NPs were examined by a set of experiments involving a heterogeneous Fenton-like process that removed direct blue 15 (DB15) dye from wastewater. The resultant E-Fe/Cu@B-NPs were characterised by scanning electron microscopy, Brunauer–Emmet–Teller analysis, zeta potential analysis, Fourier transform infrared spectroscopy and atomic force microscopy. The operating parameters in batch experiments were optimised using Box–Behnken design. These parameters were pH, hydrogen peroxide (H2O2

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Facies Analysis and Geological modeling of Euphrates Formation in Ajeel Oil Field, Northern Iraq
...Show More Authors

The current study summarized the construction of a three-dimensional geological model of the Aquitanian sediments age, which represented by the Euphrates and Serikagni formation in Ajeel Oil Field, where Ajeel Oil Field has structural closure towards northwest - southeast. Sedimentary of the current study consist of limestone, dolomitic limestone, dolomite (compose of skeletal grains, non-skeletal grains and cement) and the appearance of some anhydrite rocks.

     The petrographic study of the Euphrates Formation were prepared using a thin section of wells (Aj-1, Aj-4, Aj-5, Aj-6 and Aj-7), Previous studies and geological reports, as well as use well logs data  in the statistical analysis by Petrel softwa

... Show More
View Publication Preview PDF