An experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of vegetative , flowery growth , yield and its components in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1= cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses) by using RCBD with three replications. Three parameters model with chi square test and six parameters model were used to estimate the type of gene effects , in breeding depression , components of genetic variance , mean degree of dominance , heritability and expected gain due to selection. The results showed that dominance and epistatic (additive x additive) and (dominance x dominance) effects were great importance than additive effects in most traits of all crosses. In breeding depression was important except for plant length . Broad sense heritability ranged from 51.68 – 90.25% for plant length in crosses 3 , 5 and 6 while narrow – sense heritability was high (76.6 and 83.9%) for No. of leaves in crosses , 2,5 respectively and (57.13%) for No. of Nodes to first female flower in cross 6. Expected gain due to selection among F2 was agreat (29.5%) for No. of leaves in cross 5 while it was low to moderate some traits in other crosses. Also the results showed in yield and its component that dominance and epistatic (additive x additive) and (dominance x dominance) effects were great importance than additive effects in most traits of all crosses. In breeding depression was important except for fruit weight . Broad sense heritability was high in fruit weight , plant yields , and total yield (67.05 , 52.54 , 52.56) respectively for cross 1 , while it was low to moderate in some traits and crosses and narrow – sense heritability was high in fruit weight (40.82) for cross 6 and low in some traits to some crosses. Expected gain due to selection was low in plant yield and total yield for cross 4 and fruit weight for cross 6.
The aim of this research is to estimate the parameters of the linear regression model with errors following ARFIMA model by using wavelet method depending on maximum likelihood and approaching general least square as well as ordinary least square. We use the estimators in practical application on real data, which were the monthly data of Inflation and Dollar exchange rate obtained from the (CSO) Central Statistical organization for the period from 1/2005 to 12/2015. The results proved that (WML) was the most reliable and efficient from the other estimators, also the results provide that the changing of fractional difference parameter (d) doesn’t effect on the results.
ABSTRACT
A laboratory experiment was carried out during winter season of 2021 in the Seed Technology Laboratory- College of Agricultural Engineering Sciences/ University of Baghdad, to find out the allopathic effects of aerobic and terrestrial aqueous extracts of Artemisia vulgaris L. on the seed germination and seedling growth of linseed. A factorial experiment according to a completely randomized design (CRD)at three replicates was used; the first factor in clouded type of aqueous extract for two plant parts which were aerobic (stems and leaves) and terrestrial (root and rhizomes), while the second factor included five concentrations
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreWhen the depth of stressed soil is rather small, Plate Load Test (PLT) becomes the most efficient test to estimate the soil properties for design purposes. Among these properties, modulus of subgrade reaction is the most important one that usually employed in roads and concrete pavement design. Two methods are available to perform PLT: static and dynamic methods. Static PLT is usually adopted due to its simplicity and time saving to be performs in comparison with cyclic (dynamic) method. The two methods are described in ASTM standard.
In this paper the effect of the test method used in PLT in estimation of some mechanical soil properties was distinguished via a series of both test methods applied in a same site. The comparison of
... Show MoreEstimation of the names and verbs of some letters to consider the grammatical industry
The tactical side in application of offensive plans in basketball did not take a large in scientific research because it always change because it related in mental ability of players and for the condition of the game and researchers notice that from their followed a lot of games for Duhok basketball club in Iraq league. There is a problem that connected in games results it clears in weakness in application of offensive plans in all kind (man to man & zone defense & side ball plans & under basketball and half court). The goal of study concentrate by designing a sheet for som offensive plans for study and analysis to Duhok club on Asian Championship 2011 at the base the sample contained (Iraq Duhok & application science Jordan & Lebanon sport
... Show MoreMicrobial Desalination Cell (MDC) is capable of desalinating seawater, producing electrical power and treating wastewater. Previously, chemical cathodes were used, which were application restrictions due to operational expenses are quite high, low levels of long-term viability and high toxicity. A pure oxygen cathode was using, external resistance 50 and 150 k Ω were studied with two concentrations of NaCl in the desalination chamber 15-25 g/L which represents the concentration of brackish water and sea water. The highest energy productivity was obtained, which amounted to 44 and 46 mW/m3, and the maximum limit for desalination of saline water was (31% and 26%) for each of 25 g / L and 15 g / L, respectively, when using an ex
... Show MoreCupressus sempervirens L., Cupressaceae, that is known as evergreen cypress, Mediterranean cypress and in Arabic called “al -Sarw. It is an evergreen, medium sized, longevity, and wide distributed over all the world. The plant represents an important member of conifer plants which characterized with aromatic leaves and cones. Cupressus sempervirens have been ethnobotanical uses as an antiseptic, relief of cough, astringent, antispasmodic, wound healing and anti-inflammatory. Aims of this work are phytochemical analysis, isolation and structural identification of Quercitroside (quercitrin) and essential oil in Iraqi C. sempervirens. Isolation of quercitrin was
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show More