Preferred Language
Articles
/
1hYcsIsBVTCNdQwCVdZr
Technological Advances in Soil Penetration Resistance Measurement and Prediction Algorithms
...Show More Authors

Soil compaction is one of the most harmful elements affecting soil structure, limiting plant growth and agricultural productivity. It is crucial to assess the degree of soil penetration resistance to discover solutions to the harmful consequences of compaction. In order to obtain the appropriate value, using soil cone penetration requires time and labor-intensive measurements. Currently, satellite technologies, electronic measurement control systems, and computer software help to measure soil penetration resistance quickly and easily within the precision agriculture applications approach. The quantitative relationships between soil properties and the factors affecting their diversity contribute to digital soil mapping. Digital soil maps use machine learning algorithms to determine the above relationship. Algorithms include multiple linear regression (MLR), k-nearest neighbors (KNN), support vector regression (SVR), cubist, random forest (RF), and artificial neural networks (ANN). Machine learning made it possible to predict soil penetration resistance from huge sets of environmental data obtained from onboard sensors on satellites and other sources to produce digital soil maps based on classification and slope, but whose output must be verified if they are to be trusted. This review presents soil penetration resistance measurement systems, new technological developments in measurement systems, and the contribution of precision agriculture techniques and machine learning algorithms to soil penetration resistance measurement and prediction.

Scopus Crossref
View Publication
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
Technological development and its association with the formal change to devices Flatiron: يوجل عبد الحسين فارس
...Show More Authors

Evolution in the modern era Which led to the rapid change in the forms of industrial products For many reasons, So put current research into question the view (What are the design requirements that define the formal change in the Iron clothes)? To reach the aim of In the design cornerstonesUnderlying the formal changethe Iron of the clothes, In the first section shed light on the development stages of systems design lists the historic stages of development and energy operator devices irons and mechanism of action and internal components, while in the second part, which was entitled (The role of technology and the factors influencing the change formality of Iron) touched on the three topics which technology modern industrial and receiver,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Engineering
Effect of Variation of Degree of Saturation with depth on Soil–Concrete Pile Interface in Clayey Soil
...Show More Authors

Bearing capacity of a concrete pile in fine grained cohesive soils is affected by the degree of saturation of the surrounding soil through the contribution of the matric suction. In addition, the embedded depth and the roughness of the concrete pile surface (expressed as British Pendulum Number BPN) also have their contribution to the shear strength of the concrete pile, consequently its bearing capacity. Herein, relationships among degree of saturation, pile depth, and surface roughness, were proposed as a mathematical model expressed as an equation where the shear strength of a pile can be predicted in terms of degree of saturation, depth, and BPN. Rel

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 11 2021
Journal Name
Sustainable Civil Infrastructures
Field Soil Electrical Resistivity Measurements of Some Soil of Iraq
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Technological Literacy in Educational Programs in The Department of Accounting: As one of the Resources of Human Development
...Show More Authors

Education is considered the corner stone of all nations development. It is the principal way for the development of human sources and the most achievements of the age due to the knowledge of these resources .                                           

   As its active role which accounting departments implement in Iraq universities , (public and private) through their teaching programs , they aim to supply labour-market with qualified cadre graduated as accountants auditors , tax auditors , financial analysts , ac

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 20 2020
Journal Name
Solid State Technology
Comparative Study for Bi-Clustering Algorithms: Historical and Methodological Notes
...Show More Authors

View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Stamps extraction using local adaptive k- means and ISODATA algorithms
...Show More Authors

<span>One of the main difficulties facing the certified documents documentary archiving system is checking the stamps system, but, that stamps may be contains complex background and surrounded by unwanted data. Therefore, the main objective of this paper is to isolate background and to remove noise that may be surrounded stamp. Our proposed method comprises of four phases, firstly, we apply k-means algorithm for clustering stamp image into a number of clusters and merged them using ISODATA algorithm. Secondly, we compute mean and standard deviation for each remaining cluster to isolate background cluster from stamp cluster. Thirdly, a region growing algorithm is applied to segment the image and then choosing the connected regi

... Show More
View Publication
Scopus (13)
Crossref (4)
Scopus Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Improved Image Compression Technique Using EZW and SPHIT Algorithms
...Show More Authors

 Uncompressed form of the digital images are needed a very large storage capacity amount, as a consequence requires large communication bandwidth for data transmission over the network. Image compression techniques not only minimize the image storage space but also preserve the quality of image. This paper reveal image compression technique which uses distinct image coding scheme based on wavelet transform that combined effective types of compression algorithms for further compression. EZW and SPIHT algorithms are types of significant compression techniques that obtainable for lossy image compression algorithms. The EZW coding is a worthwhile and simple efficient algorithm. SPIHT is an most powerful technique that utilize for image

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jul 25 2019
Journal Name
Advances In Intelligent Systems And Computing
Solving Game Theory Problems Using Linear Programming and Genetic Algorithms
...Show More Authors

View Publication
Scopus (18)
Crossref (12)
Scopus Crossref