Asia Al-Hachami, Meethaq Sattar Abood, Yass K. Abbass
Fusarium spp. One of Most important fungal disease that affecting wheat plant, during the period from February 2022 to September 2022, study done by taken 128 isolates, belonging to Fusarium spp. were obtained from wheat plants showing symptoms of crown and root disease taken from different area of waist city including (Al-Numaniyah, Kut, Dabuni, Sheikh Saad).
{"title":"The enzymatic effect of Fusarium spp. on wheat plant and its role in pathogenicity as a one of virulence factor.","authors":"Asia Al-Hachami, Meethaq Sattar Abood, Yass K. Abbass","doi":"10.31185/wjps.118","DOIUrl":"https://doi.org/10.31185/wjps.118","url":null,"abstract":"Fusarium spp. One of Most important fungal disease that affecting wheat plant, during the period from February 2022 to September 2022, study done by taken 128 isolates, belonging to Fusarium spp. were obtained from wheat plants showing symptoms of crown and root disease taken from different area of waist city including (Al-Numaniyah, Kut, Dabuni, Sheikh Saad).","PeriodicalId":167115,"journal":{"name":"Wasit Journal of Pure sciences","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128791546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emotion recognition based on a speech signal is one of intensively studied research topics in the domains of human-computer interaction and affective computing. The main idea are a new Hybrid feature set was introduced in extract features , which use the basic concept in work is the Residual Signal of the prediction procedure, which is the difference between the original and its prediction ,by enter to the internal structure of the signal axis and calculate a features for some specific regions after that calculate moments for these regions . Machine learning techniques will be used to classify to achieve a high degree of accuracy.Publicly available speech datasets like the berlin dataset are tested using a decision tree classifier. The hybrid features were trained separately. The results indicated that features very encouraging, reaching 98.5%. In this article, the decision tree classifier test results with the same tested hybrid features that published in a previous article will be presented, also a comparison between some related works and the proposed technique in speech emotion recognition techniques.
{"title":"Emotion Recognition Based on Speech Signal Using Hybrid Features with Decision tree","authors":"Fatima A. Hameed","doi":"10.31185/wjps.126","DOIUrl":"https://doi.org/10.31185/wjps.126","url":null,"abstract":"Emotion recognition based on a speech signal is one of intensively studied research topics in the domains of human-computer interaction and affective computing. The main idea are a new Hybrid feature set was introduced in extract features , which use the basic concept in work is the Residual Signal of the prediction procedure, which is the difference between the original and its prediction ,by enter to the internal structure of the signal axis and calculate a features for some specific regions after that calculate moments for these regions . Machine learning techniques will be used to classify to achieve a high degree of accuracy.Publicly available speech datasets like the berlin dataset are tested using a decision tree classifier. The hybrid features were trained separately. The results indicated that features very encouraging, reaching 98.5%. In this article, the decision tree classifier test results with the same tested hybrid features that published in a previous article will be presented, also a comparison between some related works and the proposed technique in speech emotion recognition techniques.","PeriodicalId":167115,"journal":{"name":"Wasit Journal of Pure sciences","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133304650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A valve is a device used to control the flow of the fluid. The control is achieved by closing, opening or partially obstructing various passageways. Valves have many applications and the valves are considered to be pipe fittings, and there are many different valve designs. Each of the many different valve designs has its own advantages and disadvantages. For example, the gate valve slides up and down like a gate, the globe valve closes a hole placed in the valve, the angle valve is a globe valve with a 90° turn, and the check valve allows the fluid to flow only in one direction. In this paper, the present investigation is to explore the effect open and close valve on water hammer and study the valve types with equations for every valve, the results give information about the pattern of valve closing and valve opening crescent water hammer.
{"title":"Mathematical Geometric of Open and Closed Valve in Water Hammer","authors":"Z. Jabar, Esam Ahmed","doi":"10.31185/wjps.111","DOIUrl":"https://doi.org/10.31185/wjps.111","url":null,"abstract":"A valve is a device used to control the flow of the fluid. The control is achieved by closing, opening or partially obstructing various passageways. Valves have many applications and the valves are considered to be pipe fittings, and there are many different valve designs. Each of the many different valve designs has its own advantages and disadvantages. For example, the gate valve slides up and down like a gate, the globe valve closes a hole placed in the valve, the angle valve is a globe valve with a 90° turn, and the check valve allows the fluid to flow only in one direction. In this paper, the present investigation is to explore the effect open and close valve on water hammer and study the valve types with equations for every valve, the results give information about the pattern of valve closing and valve opening crescent water hammer.","PeriodicalId":167115,"journal":{"name":"Wasit Journal of Pure sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130733171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, several of the generalizations Koebe function are introduced and investigated. In this study, a linear complex operator is investigated in terms of the generalized Koebe function and Wright function. A new geometric class, namely a uniformly starlike class, is provided. Furthermore, certain properties are discussed such as coefficient bounds, growth, distortion results, radii of convexity, starlikeness and close-to-convexity.
{"title":"An Analytical Investigation of Uniformly Star Like Class of Functions via Generalized Koebe Function","authors":"Anwar H. Moureh, Hiba F. Al-Janaby","doi":"10.31185/wjps.102","DOIUrl":"https://doi.org/10.31185/wjps.102","url":null,"abstract":"Recently, several of the generalizations Koebe function are introduced and investigated. In this study, a linear complex operator is investigated in terms of the generalized Koebe function and Wright function. A new geometric class, namely a uniformly starlike class, is provided. Furthermore, certain properties are discussed such as coefficient bounds, growth, distortion results, radii of convexity, starlikeness and close-to-convexity.","PeriodicalId":167115,"journal":{"name":"Wasit Journal of Pure sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130423384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we presented a new properties of a weakly completely prime graph, where we added the algebraic properties in this graph and extracted from them some important theories and results, with the study of homomorphism in this graph when homomorphism is available in near rings, as well as the definition of homomorphism preserve vertex cover, with the proving of a number of theorems and supported relationships with examples.
{"title":"Weakly Completely Prime Graph","authors":"Ameer A. J. AL-Swidi, Ahmed A.Omran","doi":"10.31185/wjps.84","DOIUrl":"https://doi.org/10.31185/wjps.84","url":null,"abstract":" In this paper, we presented a new properties of a weakly completely prime graph, where we added the algebraic properties in this graph and extracted from them some important theories and results, with the study of homomorphism in this graph when homomorphism is available in near rings, as well as the definition of homomorphism preserve vertex cover, with the proving of a number of theorems and supported relationships with examples.","PeriodicalId":167115,"journal":{"name":"Wasit Journal of Pure sciences","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134289042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wheat is one of the most important plant in the world as it used as a nutritional food source can avvacted by many fungal disease like leaf blight disease &black mold disease which caused by A.alternata ,during the period from February 2022 to September 2022, study done by taken 180 samples from infected wheat plant lesions collected in regions where A.alternaria leaf blight and black mold has been reported were studied from different area in wasit city including (Al-Numaniyah, Kut, Dabuni, Sheikh Saad,
{"title":"The enzymatic effect of Alternaria alternata on wheat plant and its role in pathogenicity as a virulence factor","authors":"Asia Al-Hachami","doi":"10.31185/wjps.119","DOIUrl":"https://doi.org/10.31185/wjps.119","url":null,"abstract":"Wheat is one of the most important plant in the world as it used as a nutritional food source can avvacted by many fungal disease like leaf blight disease &black mold disease which caused by A.alternata ,during the period from February 2022 to September 2022, study done by taken 180 samples from infected wheat plant lesions collected in regions where A.alternaria leaf blight and black mold has been reported were studied from different area in wasit city including (Al-Numaniyah, Kut, Dabuni, Sheikh Saad,","PeriodicalId":167115,"journal":{"name":"Wasit Journal of Pure sciences","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127034511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The COVID-19 pandemic has necessitated new methods for controlling the spread of the virus, and machine learning (ML) holds promise in this regard. Our study aims to explore the latest ML algorithms utilized for COVID-19 prediction, with a focus on their potential to optimize decision-making and resource allocation during peak periods of the pandemic. Our review stands out from others as it concentrates primarily on ML methods for disease prediction.To conduct this scoping review, we performed a Google Scholar literature search using "COVID-19," "prediction," and "machine learning" as keywords, with a custom range from 2020 to 2022. Of the 99 articles that were screened for eligibility, we selected 20 for the final review.Our systematic literature review demonstrates that ML-powered tools can alleviate the burden on healthcare systems. These tools can analyze significant amounts of medical data and potentially improve predictive and preventive healthcare.
{"title":"Covid-19 Prediction using Machine Learning Methods: An Article Review","authors":"Samera Shams Hussein, Wisal Hashim Abdulsalam, Wisam Abed Shukur","doi":"10.31185/wjps.124","DOIUrl":"https://doi.org/10.31185/wjps.124","url":null,"abstract":"The COVID-19 pandemic has necessitated new methods for controlling the spread of the virus, and machine learning (ML) holds promise in this regard. Our study aims to explore the latest ML algorithms utilized for COVID-19 prediction, with a focus on their potential to optimize decision-making and resource allocation during peak periods of the pandemic. Our review stands out from others as it concentrates primarily on ML methods for disease prediction.To conduct this scoping review, we performed a Google Scholar literature search using \"COVID-19,\" \"prediction,\" and \"machine learning\" as keywords, with a custom range from 2020 to 2022. Of the 99 articles that were screened for eligibility, we selected 20 for the final review.Our systematic literature review demonstrates that ML-powered tools can alleviate the burden on healthcare systems. These tools can analyze significant amounts of medical data and potentially improve predictive and preventive healthcare.","PeriodicalId":167115,"journal":{"name":"Wasit Journal of Pure sciences","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116209609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper discusses some algorithms for solving Volterra's integral equations of the second degree using non-boundary spline functions, including (linear and cubic), as the linear spline function presents some laws and algorithms of its own, as well as the cubic spline function has its laws and algorithm. They are applied and combined in a language program MATLAB R2022a to find the numerical solution for them and the difference between them through the error percentage that appears for each of them. The preview is done through the drawing, as shown in the examples below.
{"title":"Algorithms for Solving Volterra Integral Equations Using Non-Polynomial Spline Function","authors":"Issa Hamza, Ahmed Shihab Al-Atabi","doi":"10.31185/wjps.81","DOIUrl":"https://doi.org/10.31185/wjps.81","url":null,"abstract":"This paper discusses some algorithms for solving Volterra's integral equations of the second degree using non-boundary spline functions, including (linear and cubic), as the linear spline function presents some laws and algorithms of its own, as well as the cubic spline function has its laws and algorithm. They are applied and combined in a language program MATLAB R2022a to find the numerical solution for them and the difference between them through the error percentage that appears for each of them. The preview is done through the drawing, as shown in the examples below.","PeriodicalId":167115,"journal":{"name":"Wasit Journal of Pure sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130394735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The hypothetical as well as system derivation have been shaped by data computing into the analysis of tomorrow. The global computing framework is rapidly influencing cloud development. The security aspects in a cloud-based computing environment remain at the middle of attention, despite the fact that it is important to take further period for could investigation by motivating it to separate fields. The development of cloud subordinate divisions and expert centers has resulted in the provision of optional mission design that is subject to cloud advancement. In order to guard against the potential consequences of being exposed to undesirable communal contests in cases such that, the cloud servers it is adjusted to store such data, weak info of various parameters is typically stored in servers using wireless locations with the presence of various cloud-based systems using geographically consumed info networks producers. The flexibility and benefits of cloud computing will be difficult to accept if the security is inadequate. This study examines cloud analyzing and cloud structure while also addressing security concerns and information computing standards. In addition, a new adversaries administration security strategy based on CNN will be proposed and compared to other readily available security regions. The obtained results for the CNN algorithm show a success rate of 100% with only 0.18 losses at batch number of 2*104. Also the confusion matrix show a very high classification measure for the trained samples among the target with resulting classes.
{"title":"CNN Technique Security Inspection for Data Computing Networks","authors":"Doaa Mohsin Abd Ali","doi":"10.31185/wjps.122","DOIUrl":"https://doi.org/10.31185/wjps.122","url":null,"abstract":"The hypothetical as well as system derivation have been shaped by data computing into the analysis of tomorrow. The global computing framework is rapidly influencing cloud development. The security aspects in a cloud-based computing environment remain at the middle of attention, despite the fact that it is important to take further period for could investigation by motivating it to separate fields. The development of cloud subordinate divisions and expert centers has resulted in the provision of optional mission design that is subject to cloud advancement. In order to guard against the potential consequences of being exposed to undesirable communal contests in cases such that, the cloud servers it is adjusted to store such data, weak info of various parameters is typically stored in servers using wireless locations with the presence of various cloud-based systems using geographically consumed info networks producers. The flexibility and benefits of cloud computing will be difficult to accept if the security is inadequate. This study examines cloud analyzing and cloud structure while also addressing security concerns and information computing standards. In addition, a new adversaries administration security strategy based on CNN will be proposed and compared to other readily available security regions. The obtained results for the CNN algorithm show a success rate of 100% with only 0.18 losses at batch number of 2*104. Also the confusion matrix show a very high classification measure for the trained samples among the target with resulting classes.","PeriodicalId":167115,"journal":{"name":"Wasit Journal of Pure sciences","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126579166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The goal of this paper was to study the applications of the projective plane PG (2, q) over a Galois field of order q in the projective q-ary (n, M, d) -code such that the parameters length of code n, the maximum value size code M, and the minimum distance d with the error-correcting e according to an incidence matrix have been calculated. Also, this research provides examples and theorems of links between the combinatorial structures and coding theory. The method of the research depends on the classification of the points and lines in PG (2, q).
本文研究了射影平面PG (2, q)在q阶伽罗瓦域上在射影q-ary (n, M, d)码中的应用,计算出了码的参数长度n、码的最大值尺寸M和根据关联矩阵进行误差校正的最小距离d。此外,本文还提供了组合结构与编码理论之间联系的实例和定理。研究的方法依赖于PG (2, q)中的点和线的分类。
{"title":"Construction of q-ary(n,M,d)-codes in PG(2,16)","authors":"Dunya Fareeq Fendi, Nada Yassen Kasm Yahya","doi":"10.31185/wjps.110","DOIUrl":"https://doi.org/10.31185/wjps.110","url":null,"abstract":"The goal of this paper was to study the applications of the projective plane PG (2, q) over a Galois field of order q in the projective q-ary (n, M, d) -code such that the parameters length of code n, the maximum value size code M, and the minimum distance d with the error-correcting e according to an incidence matrix have been calculated. Also, this research provides examples and theorems of links between the combinatorial structures and coding theory. The method of the research depends on the classification of the points and lines in PG (2, q).","PeriodicalId":167115,"journal":{"name":"Wasit Journal of Pure sciences","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115834445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}