The experiment was carried out in College of Agricultural Engineering Sciences, University of Baghdad during November 1, 2019 to June 1, 2020. The experiment was designed according to a randomized complete block design. Each block contained 18 experimental units that included the three study factors. The first factor interaction between two inoculum densities and application methods, three levels control, treatment of seeds inoculation with 5g plant and treatment of seedlings inoculation whith 30g plant . The second factor was three -1 -1concentrations of spraying of kinetin 0, 75 and 150 mg L , and third factor include two levels of organic manure) and addition of fertilizer 2% of -1 the weight of the soil (O2). The results showed a signif
... Show MoreThe article deals with the role of metaphors in forming the plot of L. Ulitskaya’s family chronicle “Medea and Her Children”. The author of the article describes the results of the next stage of research related to the works of Lyudmila Evgenievna Ulitskaya, a representative of modern Russian prose. The analysis of tropes and figures in the works written at the turn of the XXth – XXIth centuries is of importance for the study of the modern state of Russian language as an independent system. “Medea and Her Children” is one of the works by L. Ulitskaya (written in 1996), which, like her other works, is characterized by a unique style of narration, rich in vocabulary, lexical, semantic and stylistic diversity of the author’s word
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe purpose of this paper is to identifying the level of skill self-esteem of the young tennis players in the Governorate of Baghdad, identifying some aspects of attention (acuteness, concentration, and diversion of attention) among the young tennis players of the Baghdad governorate, and identify the skills of serve and serve spiking in tennis by young tennis players in Baghdad governorate. The researchers used the descriptive approach in the correlative relations style for its suitability and the research problem. the research sample was chosen in a deliberate way from the youth team players in tennis for the Governorate of Baghdad and the participants in the 2021-2022 sports season, whose number is (20) male players and (4) young playe
... Show MoreA large number of researchers had attempted to identify the pattern of the functional relationship between fertility from a side and economic and social characteristics of the population from another, with the strength of effect of each. So, this research aims to monitor and analyze changes in the level of fertility temporally and spatially in recent decades, in addition to estimating fertility levels in Iraq for the period (1977-2011) and then make forecasting to the level of fertility in Iraq at the national level (except for the Kurdistan region), and for the period of (2012-2031). To achieve this goal has been the use of the Lee-Carter model to estimate fertility rates and predictable as well. As this is the form often has been familiar
... Show MoreObjective(s) : This study aimed at evaluating the seroprevalence of anti -HCV and studying the
correlation between hemophilia and risk factors for acquiring HCV such as age , marital status &
occupation among hemophilic patients .
Methodology : 210 hemophilic patients in children welfare teaching hospital/medical city/Baghdad–Iraq
(hemophilia center) were investigated using prepared questionnaire and tested for HCV infection, those
were measuring patient’s age, hemophilia types and severity, marital status, residency and history of
previous HCV infection .
Results : Most hemophilic patients were hemophilia A at severe , hemophilia was at age group 20 – 29
years , the majority of patients were unmarried a
In this research we study a variance component model, Which is the one of the most important models widely used in the analysis of the data, this model is one type of a multilevel models, and it is considered as linear models , there are three types of linear variance component models ,Fixed effect of linear variance component model, Random effect of linear variance component model and Mixed effect of linear variance component model . In this paper we will examine the model of mixed effect of linear variance component model with one –way random effect ,and the mixed model is a mixture of fixed effect and random effect in the same model, where it contains the parameter (μ) and treatment effect (τi ) which has
... Show More