An experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of vegetative and flowery growth in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1 = cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses) by using RCBD with three replications. Three parameters model with chi square test and six parameters model were used to estimate the type of gene effects , in breeding depression , components of genetic variance , mean degree of dominance , heritability and expected gain due to selection. The results showed that dominance and epistatic (additive x additive) and (dominance x dominance) effects were great importance than additive effects in most traits of all crosses. In breeding depression was important except for plant length . Broad-sense heritability ranged from 51.68 – 90.25% for plant length in crosses 3 , 5 and 6 while narrow – sense heritability was high (76.6 and 83.9%) for No. of leaves in crosses , 2,5 respectively and (57.13%) for No. of Nodes to first female flower in cross 6. Expected gain due to selection among F2 was agreat (29.5%) for No. of leaves in cross 5 while it was low to moderate some traits in other crosses
The search involve the synthesis of some new 1,3-oxazepine and 1,3-diazepine derivatives were synthesized from Schiff base. The Schiff base (VIII) prepared from reaction of aldehyde (IV) derived from L-ascorbic acid with aromatic amine ([2-(4- nitrophenyl)-5-(4-aminophenyl)-1,3,4-oxadiazole] (VII). Oxazepine compounds (IX-XI) were synthesized from the cyclic condensation of Schiff base (VIII) with (maleic, phthalic and 3-nitrophthalic) anhydride, compounds (IX-XI) that were reacted with p-methoxyaniline to give diazepine derivatives (XII-XIV). The structures of the new synthesized compounds have been confirmed by physical properties and spectroscopy measurements such as FTIR, and some of them by 1 H-NMR, 13 CNMR, Mass, and evaluated
... Show MoreA fixed callus weight of 150 mg was induced from immature embryos of three bread wheat Triticum aestivum L. genotypes (Tamos 2, El-izz and Mutant 1) cultured on nutrient medium {MS) containing Polyethylene glycol (PEG-6000) supplemented with concentrations (0.0, 3.0, 6.0, 9.0 or 12.0%) to evaluate their tolerance to water stress. Cultures were incubated in darkness at temperature of 25?1 ?C. Callus fresh and dry weights were recorded and soluble Carbohydrate and the amino acid Proline concentrations were determined. Results showed that there were significant differences in studied parameters among bread wheat genotypes of which Tamos 2 was higher in callus average fresh and dry weights which gave 353.33 and 38.46 mg/cultured tube respecti
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreGumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu
... Show MoreA new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.
In this paper, we introduce three robust fuzzy estimators of a location parameter based on Buckley’s approach, in the presence of outliers. These estimates were compared using the variance of fuzzy numbers criterion, all these estimates were best of Buckley’s estimate. of these, the fuzzy median was the best in the case of small and medium sample size, and in large sample size, the fuzzy trimmed mean was the best.
Drilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.
In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation
... Show MoreDrilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.
In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation
... Show MoreThe experimental and numerical analysis was performed on pipes suffering large plastic deformation through expanding them using rigid conical shaped mandrels, with three different cone angles (15◦, 25◦, 35◦) and diameters (15, 17, 20) mm. The experimental test for the strain results investigated the expanded areas. A numerical solution of the pipes expansion process was also investigated using the commercial finite element software ANSYS. The strains were measured for each case experimentally by stamping the mesh on the pipe after expanding, then compared with Ansys results. No cracks were generated during the process with the selected angles. It can be concluded that the strain decreased with greater angles of con
... Show More