Wearable sensors are a revolutionary tool in agriculture because they collect accurate data on plant environmental conditions that affect plant growth in real-time. Moreover, this technology is crucial in increasing agricultural sustainability and productivity by improving irrigation strategies and water resource management. This review examines the role of wearable sensors in measuring plant water content, leaf and air humidity, stem flow, plant and air temperature, light, and soil moisture sensors. Wearable sensors are designed to monitor various plant physiological parameters in real-time. These data, obtained through wearable sensors, provide information on plant water use and physiology, making our agricultural choices more informed and accurate. Internet of Things (IoT) technologies can improve irrigation strategies and reduce water consumption by analyzing data from wearable sensors and adapting it to automate the irrigation system. The review also highlights the importance of using Artificial Intelligence (AI) to predict plant water needs accurately. This review concludes that wearable sensors provide accurate and real-time data on the stress state of plants and their surroundings, improving water management efficiency and agricultural production sustainability. These IOT and AI-enabled technologies are a crucial milestone toward smart and sustainable agriculture, which shows the importance of innovation in responding to enhanced climate threats.
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreEverybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, sc
... Show MoreTraffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c
... Show MoreThe field study of this paper focused on the motives for lawyers to use the website
of the Supreme Judicial Council, and the gratifications achieved as a result of its use.
This study sought to achieve a number of goals, including:
1. Monitoring the patterns of lawyers’ use of the website of the Supreme Judicial Council.
2. Determining the forms that lawyers use to interact on the website of the Supreme
Judicial Council.
This study is a descriptive in kind as the researcher relied on the ‘survey method’ in
its study of the external audience (lawyers) using the questionnaire and scale toolThe questionnaire was distributed among a deliberately chosen sample, consisting of
(160) lawyers who used the website of
Worldwide, enormous amounts of waste cause major environmental issues, including scrap tires and plastic, and large waste, a consequence of the demolition of buildings, including crushed concrete, crushed clay bricks, and crushed thermo-stone. From that point, it’s possible to consider that the recycling processes for these materials and using them in the manufacturing field will reduce the adverse effects on the environment of these wastes and the consumption of natural resources. Sustainable concrete blocks can be considered as one of the products produced by using these materials as partial volume replacement of the coarse, fine aggregate, or cement content, considering their dry density, workability, absorption, co
... Show MoreWorldwide, enormous amounts of waste cause major environmental issues, including scrap tires and plastic, and large waste, a consequence of the demolition of buildings, including crushed concrete, crushed clay bricks, and crushed thermo-stone. From that point, it’s possible to consider that the recycling processes for these materials and using them in the manufacturing field will reduce the adverse effects on the environment of these wastes and the consumption of natural resources. Sustainable concrete blocks can be considered as one of the products produced by using these materials as partial volume replacement of the coarse, fine aggregate, or cement content, considering their dry density, workability, absorption, compressive st
... Show MoreThe study attempts to assess water quality in Abu-Zirig Marsh which used epiphytic Diatom community for assessing water quality. Many of Diatom indices {Trophic diatom index (TDI), Diatom index (DI), Generic diatom index (GDI) have been used to give qualitative information about the status of the freshwater ecosystem(good, moderate, high pollution). In this study, the epiphytic diatoms on both host aquatic plants Phragmites australis and Typha domengensis were collected from Abu-Zirig Marsh within Thi-Qar Province at three sites in Autumn, 2018 and winter, 2019. Epiphytic diatoms were Identified by the preparation of permanent slides method, some species of epiphytic diatom showed dominance such as Cyclotella menegh
... Show MoreIn the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More