Soil compaction is one of the most harmful elements affecting soil structure, limiting plant growth and agricultural productivity. It is crucial to assess the degree of soil penetration resistance to discover solutions to the harmful consequences of compaction. In order to obtain the appropriate value, using soil cone penetration requires time and labor-intensive measurements. Currently, satellite technologies, electronic measurement control systems, and computer software help to measure soil penetration resistance quickly and easily within the precision agriculture applications approach. The quantitative relationships between soil properties and the factors affecting their diversity contribute to digital soil mapping. Digital soil maps use machine learning algorithms to determine the above relationship. Algorithms include multiple linear regression (MLR), k-nearest neighbors (KNN), support vector regression (SVR), cubist, random forest (RF), and artificial neural networks (ANN). Machine learning made it possible to predict soil penetration resistance from huge sets of environmental data obtained from onboard sensors on satellites and other sources to produce digital soil maps based on classification and slope, but whose output must be verified if they are to be trusted. This review presents soil penetration resistance measurement systems, new technological developments in measurement systems, and the contribution of precision agriculture techniques and machine learning algorithms to soil penetration resistance measurement and prediction.
The research aims to shed light on the possibility of measuring the intellectual capital in the Iraqi insurance company using accounting models, as well as disclosing it in the financial statements of the company, where human capital was measured using the present value factor model for discounted future revenues and the intellectual value-added factor model for measuring structural capital It was also disclosed in the financial statements based on the theory of stakeholders. The research problem lies in the fact that the Iraqi insurance company does not carry out the process of measuring and disclosing the intellectual capital while it is considered an important source for the company’s progress in the labor market recently. T
... Show MoreTransportation Sector classified as one of the services sectors which is without the production activities cannot be complete its rule. Is act asmoving actions which operate at production and non production goals for the organization and individuals insides the country and with others, that is why this sector act as one of the main which is occupied an important status on the way the economic activities and on the level of the economic institutions the transportation work on transforming all the commodities and products from productions locations to consumption location then its effect the productivity process and create the location utility and on the level of economic it considered as one of the economic supportive structure an
... Show MoreABSTRACT Background: Polycystic ovarian syndrome (PCOS) is one of the most important reproductive and endocrine disorders in women at reproductive age. It's associated with metabolic disorder, obesity, insulin resistance and oxidative stress chronic periodontitis and PCOS both of them associated with low chronic grade of inflammation. The prevalence of periodontal disease seems to be higher in women with PCOS. Superoxide dismutase enzyme (SOD) is an important circulating marker and protecting enzyme helping the body tissues to get rid of reactive oxygen species (ROS) that damage the tissue. Aim of the study: The aim of this study was to measure and compare the levels of (SOD) among group of chronic periodontitis patients with PCOS, group
... Show MoreIn this paper, a random transistor-transistor logic signal generator and a synchronization circuit are designed and implemented in lab-scale measurement device independent–quantum key distribution systems. The random operation of the weak coherent sources and the system’s synchronization signals were tested by a time to digital convertor.
Twelve pends were selected and distributed on three verticals transects paths on the Tigers river in Al Rasheed county.Passing through land covers, that classified and covers the whole region. Based on the 8 Landsat of the year 2015. It was oriental classified by using Erdas 10.2 . The pedons were distributed on the area of each varicty of these classes. the series of soil according of the transect series (DW74,MMg,DMu6 , Df96) respectively were represented P1 , P2 , P3 , P4 .
The second transits series(DM97,MM5,DM96,DF115) respectively were represented P5 , P6 , P7 , P8 .The third transits series(DM46,MMg,MF12,MM11) re
... Show MoreThis study investigated the prevalence of quinolones resistance proteins encoding genes (qnr genes) and co-resistance for fluoroquinolones and β-lactams among clinical isolates of Klebsiella pneumoniae. Out of 150 clinical samples, 50 isolates of K. pneumoniae were identified according to morphological and biochemical properties. These isolates were collected from different clinical samples, including 15 (30%) urine, 12 (24%) blood, 9 (18%) sputum, 9 (18%) wound, and 5 (10%) burn. The minimum inhibitory concentrations (MICs) assay revealed that 15 (30%) of isolates were resistant to ciprofloxacin (≥4µg/ml), 11 (22%) of isolates were resistant to levofloxacin (≥8 µg/ml), 21 (42%) of isolates were re
... Show MoreMycobacterium tuberculosis resistance to rifampicin is mainly mediated through mutations in the rpoB gene. The effects of rpoB mutations are relieved by secondary mutations in rpoA or rpoC genes. This study aims to identify mutations in rpoB, rpoA, and rpoC genes of Mycobacterium tuberculosis isolates and clarify their contribution to rifampicin resistance. Seventy isolates were identified by acid-fast bacilli smear, Genexpert assay, and growth on Lowenstein Jensen medium. Drug susceptibility, testing was performed by the proportional method. DNA extraction, PCR, and sequencing were accomplished for the entire rpoA, rpoB, and
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreAbstract
Stainless steel (AISI 304) has good electrical and thermal conductivities, good corrosion resistance at ambient temperature, apart from these it is cheap and abundantly available; but has good mechanical properties such as hardness. To improve the hardness and corrosion resistance of stainless steel its surface can be modified by developing nanocomposite coatings applied on its surface. The main objective of this paper is to study effect of electroco-deposition method on microhardness and corrosion resistance of stainless steel, and to analyze effect of nanoparticles (Al2O3, ZrO2 , and SiC) on properties of composite coatings. I
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More