A field experiment was conducted at the experimental field of botanical garden, faculty of science, university of Baghdad, in order to study the effect of plant density on growth and yield of two local cultivars of sunflower (Sin Althieb and Shumose). The densities used were 4.4 and 8.8 plant/m2. The results showed difference between cultivars in their agronomic traits and their yields. There was a significant increase in plant height and leaf area index by increasing the plant density, while head diameter, number of seeds and leaf area decreased. But the most significant effect was the increasing in yield and biological yield by increasing the plant density. There was an increase by 72% and 58% in the yield and 79% and 82% in the biological yield for Sin Althieb and Shumose, respectively. The increase was due to the increase in the number of plants per square meter and not to increase the number of seeds in the heads or seeds weight. The increase in these traits was density and sunflower genotype dependent.
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreCosmetic products contain variable amounts of nutrients that support microbial growth. Most contaminants in cosmetic products include bacteria such as Staphylococcus, Pseudomonas, Klebsiella, Achromobacter and Alcaligenes. Contaminated water is a likely source of organisms found in cosmetic products. Products such as shampoo, hand and body lotion, facial cleanser, and liquid soaps were analyzed. In this study, out of 60 cosmetic products analyzed, 26.4% were found to be contaminated. Most of the contamination was from bacteria and no fungal contamination was detected. The highest level o
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show More<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show MoreA mounted specimen of a mustelid animal deposited in the Kurdistan Museum of Natural History, Salahaddin University, Erbil proved to be Mustela erminea (Linnaeus, 1758) and represents a new record for the mammalian fauna of Iraq. Its measurements and some biological noted are provided. Also, two passerine birds; the Red-headed bunting, Emberiza bruniceps Brandt, 1841(Family, Emberizidae) and the Variable wheatear, Oenanthe picata (Blyth, 1847) (Family, Muscicapidae) were recorded for the first time in Iraq. Furthermore, the tree frog Hyla savignyi Audouin, 1829 was found in two locations north east of Iraq with spotted dorsum and having interesting behavior in having the capabil
... Show MoreEnd Stage Renal Disease is a well-known global public health problem. Maintenance hemodialysis is considered a life-saving treatment for patients with such disease. This treatment method that requires patients to be adherent to hemodialysis attendance, dietary and fluid recommendations as well as adherence to prescribed medications to ensure success. The aim of the current study was to assess adherence, perception, and counseling among hemodialysis patients to different modalities of treatment (fluid restriction, dietary recommendations, medications, and hemodialysis schedules). A cross-sectional study carried out on hemodialysis patients who attended to the dialysis centers at al- Karama teachi
... Show More