The study was carried out at field agriculture in Baghdad–Iraq in 2015. For purpose evaluated the performance the selected implements tillage, suitable tire pressure and speed tractor under silt clay loam to measured Effective field capacity, Actual Time for plowing One Donam ( hr), Appearance Tillage ( number of clods > 10 cm), Fuel consumption measure in two unit (L/Donam and L/hr) and Machinery Unit Energy Requirement ( kw.hr / Donam). Split – split plot design under randomized complete block design with three replications using Least Significant Design 5 % was used. Three factor used in this experiment included Two types of plows included Chisel and Disk plows which represented main plot, Three Tires Inflation Pressure was second fa
... Show MoreIn the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H
... Show MoreAbstract
The research aims to measure family negligence and its relationship with internet addiction among university students. The researcher has developed a scale of (20) items to measure the negligence of family, which was applied to (308) male and female university students in the first and fourth stages. The research concluded that University students suffer from family negligence. The research sample has an addiction to the Internet. There is a relationship between family neglect and addiction to the Internet among university students. The researcher came out with a number of suggestions and recommendations.
Background: Axial spondyloarthritis (axSpA) is an inflammatory, systemic rheumatic condition that mostly affects the axial skeleton. Tenascin-C (TN-C) is a hexameric glycoprotein of considerable size, upregulated in many inflammatory conditions, while Interleukin-17 (IL-17) a cytokine that plays an important role in SpA symptoms. Objective: to investigate the upregulation between the serum levels of TN-C and IL-17 in Iraqi axSpA patients and the disease characteristics. Patients and Methods: Seventy-four axSpA patients and 28 matched controls were studied. Fifty-four patients received a tumor necrosis factor inhibitor (TNFi) and 20 did not. Serum TN-C and IL-17 concentrations were determined using the ELISA technique. The Bath Ankyl
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show More