The experiment was conducted under shading (with the aid of Saran) condition on a nursery managed by the Baghdad Mayoralty during the season of 2014-2015 to study the effect of composed sheep manure extract on the growth and leaf nutrients content of tomato seedlings var. Wijdan. The experiment was composed of 6 treatments included the extract of sheep manure by hot (425C)and lmbient(205C) temperature water .The extract was diluted to the half by water and foliar applied to seedlings (multible application) or to the soil . Treatments also included the application of NPK chemical fertilizers as recommended and a control treatment through applying distilled water as foliar .The experiment was designed according to the randomized complete block design (RCBD) with three replications and means were compared using least significant differences (LSD) test at 5% level of significance. The results showed recommended chemical fertilization gave the most significant increase in terms of number of leaves, plant height, shoot dry weight, root length, and root dry weight, which were, 6.33 leaf.plant-1, 23.83 cm.plant-1, 0.711 g.plant-1, 26.08 cm.plant-1, and 0.192 g.plant-1 respectively .The treatments of hot water extracted sheep manure compost show significant effect compared to control treatment. In addition, chemical treatment significantly increased N, P, and K concentration in leaf tissue. Mg and Ca concentration were higher in hot extract treatment and chemical treatment with no differences between them . treatments of lmbient extract gave a results less than chemical treatment in all indicates and less than treatments of hot extract in some indicates , while the control treatment gave a less results in this study.
In this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreThe notion of a Tˉ-pure sub-act and so Tˉ-pure sub-act relative to sub-act are introduced. Some properties of these concepts have been studied.
Background: spontaneous abortion constitutes one of the most important adverse pregnancy outcomes affecting human reproduction, and its risk factors are not only affected by biological, demographic factors such as age, gravidity, and previous history of miscarriage,but also by individual women’s personal social characteristics, and by the larger social environment. Objective:To identifyEnvironmental effects on Women's with Spontaneous Abortion. Methodology:Non-probability(purposive sample)of(200) women, who were suffering from spontaneous abortion in maternity unitfrom four hospitals at Baghdad City which include Al-ElwiaMaternity Teaching Hospital, and Baghdad Teaching Hospital at Al-Russafa sector. Al–karckhMaternityHospita
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreFor the graph , the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.
Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show More