There are many techniques that can be used to estimate the spray quality traits such as the spray coverage, droplet density, droplet count, and droplet diameter. One of the most common techniques is to use water sensitive papers (WSP) as a spray collector on field conditions and analyzing them using several software. However, possible merger of some droplets could occur after they deposit on WSP, and this could affect the accuracy of the results. In this research, image processing technique was used for better estimation of the spray traits, and to overcome the problem of droplet merger. The droplets were classified as non-merged and merged droplets based on their roundness, then the merged droplets were separated based on the average non-merged droplets areas. The results were compared to those which were analyzed using different software. In addition, an analysis was done to samples that were created to simulate the water sensitive paper with pre-known results as a validation. The results showed that separating the droplet based on the developed software increased the coverage, droplet count, and the mean droplet diameter by an average of 1.9, 4.5, and 1.25 times, respectively. This technique showed better estimation of the spray traits using WSP.
Background: Herbal medicine can be called one of the branches of medicine in various forms. Turmericcurcumin has proved its efficiencies a coloring, flavoring agent and has been traditionally used in medicine, exhibiting remarkable anti-inflammatory and antioxidant properties. The varied biological properties of curcumin and lack of toxicity even when administered at higher doses makes it attractive to explore its use in various disorders like diseases of skin. It is good potential agent for wound healing. Materials and methods: Sixty four new Zealand rabbits were used in this study ,they were divided into four groups,each group was subdivided as follows:Experimental groups(8 rabbits) right facial side of animals for essential oil applicati
... Show MoreThe current study is aimed to identify personality types of the lecturers of Baghdad University as well as identify the prevailing types among the lecturers. In addition, the study aimed to identify the significant difference among personality types (The Enneagram) according to the variables of academic title and scientific major . One hundred and ninety four lecturers were involved in this study. In order to achieve the study's aims, the scale of (Baron& Wagele 1994) was used to measure the nine personality types (The Enneagram) that was translated by( Anwar Omar Ibrahim 2012). Some statistical analysis were used and the result demonstrated that Romantic types was found to be the most prevailing types among the lecturers of Baghdad
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThe research’s main goal is to investigate the effects of using magnetic water in concrete mixes with regard to various mechanical properties such as compressive, flexural, and splitting tensile strength. The concrete mix investigated was designed to attain a specified cylinder compressive strength (30 MPa), with mix proportions of 1:1.8:2.68 cement to sand to crushed aggregate. The cement content was about 380 kg/m3, with a w/c ratio equal to 0.54, sand content of about 685 kg/m3, and gravel content of about 1,020 kg/m3. Magnetic water was prepared via passing ordinary water throughout a magnetic field with a magnetic intensity of 9,000 Gauss. The strength test
Objective: To identify the role and importance of the clinical pharmacist in the Emergency Department on prevent
or reduced the medication error.
Methodology: We collected the medical file of 3400 patients, 1400 patient's file in (A) hospital, and 1000 patient's
file in each of (B and C) hospital, who admitted to the ED, at primary weekdays between 8 am to 2 pm, and
recorded all the intervention made by clinical pharmacist through an active search in clinical charts, with analysis
of the daily medical prescription. The potential severity of harm of the medication error judged by two reviewers,
a permanent emergency physician, and clinical pharmacist based on the National Coordinating Council (NCC) of
Medication Error
The higher education has become an enterprise integrate system that described as knowledge society, the essential part in its electronic and virtual format in the shadow of globalization challenges with its various dimensions . Until the logical ryles aboat a strategic partnership between the Iraqi higher education establishments and their international equivalent ones Strategic windows should be invested for the purpose of enhancing the quality of higher education in a sustainable way. This forms a challenge before the international education leaders on the social, operational and establishment's level to determinte knowledge gap, observing, diagnosing and processing in the present and future, e
... Show MoreAbstract
The aim of the current research is to identify the Effect of the alternative evaluation strategy on the achievement of fourth-grade female students in the subject of biology. The researchers adopted the zero hypothesis to prove the research objectives, which is there is no statistically significant difference at the level (0.05) between the average scores of the experimental group who study according to the alternative evaluation strategy and the average scores of the control group who study in accordance with the traditional method. The researchers selected the experimental partial adjustment design of the experimental and control groups with the post-test. The researchers intentionally selected (Al-fed
... Show MoreWith the increase in competition between insurance companies in addition to the increasing numbers in the number of insurance companies, whose number decreased to (32) private companies until the end of the year (2020). The blue ocean at the level and its effects on increasing the market share. Therefore, the two researchers tested the hypothesis and the research concluded that there is a relationship A .Also the researcher put some recommendations the most prominent is that the invention is considered one of the successful strategies an d the company has to encourage the employees according to inventive thoughts
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.