An experiment was conducted in a greenhouse - research station B - College of Agricultural Engineering Sciences, University of Baghdad, during the fall season of 2018 with the aim of propagating and initially studying the field performance of 18 and 20 potential potato lines derived from Rivera and Arizona cv. after in vitro exposure of nodal segments to different dosages of gamma rays (0, 10, 20, and 30 Gray) and EMS (0, 10, 20, and 30 mM). Each control cultivar and their derived lines were independently cultured in plastic bags according to the RCBD, with three replications. The results showed that the highest plant height and number of leaves were obtained from Arizona derived lines which gave 60.11 cm and 25.30 leaves.plant-1 in lines 207 and 222, respectively when compared with their control that gave 38.11 cm and 13.67 leaves.plant-1, respectively. Minitubers diameter, weight, and plant yield were in its highest values in Arizona derived lines 551, 551, and 459 which gave 35.73 mm.minituber-1, 33.13 g. minituber-1, and 133.8 g.plant-1, respectively compared to their control that gave 25.35 mm.minituber, 16.8 g.minituber, and 78.57 g.plant-1, respectively. The resulted lines were analyzed at the molecular level utilizing the inter simple sequence repeats (ISSR) markers and revealed that lines 69, 10, 68, 102, and 7 were the much distanced from its derived Rivera cultivar and gave 40.7%, 37.1%, 36.8%, 33.3%, and 30.0%, respectively while lines 551, 261, 474, and 254 were the much genetically distanced from their derived cultivar Arizona with genetic distances of 24.1%, 22.6%, 18.8%, and 17.6%, respectively.
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreWith the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor se
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreDiode laser technology is well established for biomedicine applications which demand high-power pulse-wave. They are extensively utilized from medical imaging and testing to surgical therapies and the latest aesthetic processes. For medical therapeutic practices, diode lasers have become the ideal laser source for this particular purpose. In the last previous years, semiconductor laser technology has evolved to produce high-repetitions rate near-infrared pulsed lasers diodes that are dependable, low-cost, portable, and small-weight, about few grams. In this paper, we review the recent development and demonstration of diode laser devices for biomedical applications recorded in the latest years taking into account the power, wavelength, and p
... Show MoreAn efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has
... Show MoreIn this paper, an approach for object tracking that is inspired from human oculomotor system is proposed and verified experimentally. The developed approach divided into two phases, fast tracking or saccadic phase and smooth pursuit phase. In the first phase, the field of the view is segmented into four regions that are analogue to retinal periphery in the oculomotor system. When the object of interest is entering these regions, the developed vision system responds by changing the values of the pan and tilt angles to allow the object lies in the fovea area and then the second phase will activate. A fuzzy logic method is implemented in the saccadic phase as an intelligent decision maker to select the values of the pan and tilt angle based
... Show MoreAbstract
The Purpose of This Research is The Main Factors In out Comes Phenomena From Primary School Which in Creased in Lost Period in Iraq And to Find Solutions to The This Problem.
In Order to Achieve Al The Aim The Research Choose a Systematic Random Sample of School Records For Students in Some Primary Schools in Karkh and Rusafa and Year of Study (2010-2015) and Size (40) Samples, included (16) Variable , Collected in Form Prepared by The Research As a Way to Analyze The Data.
Remember to Summarize The (6) Main components Pay a Student to Drop out of Primary Schools in The Province of Baghdad are Arranged As Follows:
... Show More
Flavonoids were extracted from Zizyphus spina-christi leaves by Ethyl acetate after acid digested and used as antioxidant. The dried extract was added separately to each sample of fat extracted from hallow cow and sheep bones as follows: T1 cow fat, T2 control for cow fat, T3 sheep fat and T4 control for sheep fat (the control T2 and T4 reffered to samples without added antioxidant).
Samples were stored at -18, 5, 25 and 55 °C for 28 days. The storage trials were conducted at -18, 5 and 25 °C for 28 days for T1, T2, T3 and T4. The chemical indices examined initially and at the end of storage period. PVs was 1.46, 1.46, 1.8 and 1.8 meq/ Kg oil respectively, FFA values were 0.245, 0.245, 0.244 and 0.244% respectively and TBA va