The experiment was conducted in Al- Mahaweel Research Station in Babel Governorate, Ministry of Agriculture during autumn season 2016-2017 to determine the role of irrigation management processes and micronutrient fertilization in growth and productivity of two varieties of wheat IPA 99 and Al-Rasheed 22 in clay loam soil classified as Typic Torriflovent. The experiment included four irrigation treatments and six fertilization treatments. The experiment was designed under randomized complete block design (RCBD) with three replications. Wheat grain IPA 99 and Al-Rasheed 22 varieties were planted in 23/11/2016 and harvested in 13/5/2017. The amount and periods of irrigation depended on sensors reading of volumetric water content was measured using GS3 sensors. Irrigation water was applied at 50% depletion to the depth of total plant root and calculate depth of water applied up to field capacity. The actual water consumption used (ETa ) for wheat IPA 99 and Al-Rasheed 22 were 707.7 and 699.7 mm season-1 for river water irrigation (I0 ) respectively. The actual water consumption used (ETa ) were 23.46, 7.21 and 23.74% for I1 , I2 and I3 of 23.46, 7.21 and 23.74% for IPA 99 and 24.87, 5.29 and 23.44% for AlRasheed 22 respectively compared to I0 treatment. The foliar application treatments indicated differences in plant height, leaf area, a number of tillering and grain yield for IPA 99 and Al-Rasheed 22. The highest value of these characteristics was T5 treatments and the lowest value for T0 treatments
The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show MoreLinear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will chan
... Show Moreهدفت الدراسة الى التعرف على مستوى استخدام إدارة المعرفة و تكنولوجيا المعلومات لدى القيادات الإدارية تُعدّ لعبة الإسكواش من الألعاب الفردية، وواحدة من ألعاب المضرب، والتي تمتاز بالسرعة والحركة الدائمة في داخل القاعة، ولعل أهم ما يميز هذه اللعبة المتعة التي يشعر بها اللاعبون الممارسون لها، لأنها تجبر ممارسيها على الحركة المستمرة عن طريق تبادل لعب الكرة، وتتميز بالتحدي المباشر، وتتطلب اليقظة والحرص وال
... Show MoreThis research aims to choose the appropriate probability distribution to the reliability analysis for an item through collected data for operating and stoppage time of the case study.
Appropriate choice for .probability distribution is when the data look to be on or close the form fitting line for probability plot and test the data for goodness of fit .
Minitab’s 17 software was used for this purpose after arranging collected data and setting it in the the program.
&nb
... Show MoreThis paper is concerned with the quaternary nonlinear hyperbolic boundary value problem (QNLHBVP) studding constraints quaternary optimal classical continuous control vector (CQOCCCV), the cost function (CF), and the equality and inequality quaternary state and control constraints vector (EIQSCCV). The existence of a CQOCCCV dominating by the QNLHBVP is stated and demonstrated using the Aubin compactness theorem (ACTH) under appropriate hypotheses (HYPs). Furthermore, mathematical formulation of the quaternary adjoint equations (QAEs) related to the quaternary state equations (QSE) are discovere so as its weak form (WF) . The directional derivative (DD) of the Hamiltonian (Ham) is calculated. The necessary and sufficient conditions for
... Show MoreThis paper addresses the use of adaptive sliding mode control for the servo actuator system with friction. The adaptive sliding mode control has several advantages over traditional sliding mode control method. Firstly, the magnitude of control effort is reduced to the minimal admissible level defined by the conditions for the sliding mode to exist. Secondly, the upper bounds of uncertainties are not required to be known in advance. Therefore, adaptive sliding mode control method can be effectively implemented. The numerical simulation via MATLAB 2014a for servo actuator system with friction is investigated to confirm the effectiveness of the proposed robust adaptive sliding mode control scheme. The results clarify, after
... Show MoreABSTRACT:. The Lower Cretaceous Zubair formation is comprised of sandstones intercalated with shale sequences. The main challenges that were encountered while drilling into this formation included severe wellbore instability-related issues across the weaker formations overlaying the reservoir section (pay zone). These issues have a significant impact on well costs and timeline. In this paper, a comprehensive geomechanical study was carried out to understand the causes of the wellbore failure and to improve drilling design and drilling performance on further development wells in the field. Failure criteria known as Mogi-Coulomb was used to determine an operating mud weight window required for safe drilling. The accuracy of the geomechanical
... Show MoreDesign sampling plan was and still one of most importance subjects because it give lowest cost comparing with others, time live statistical distribution should be known to give best estimators for parameters of sampling plan and get best sampling plan.
Research dell with design sampling plan when live time distribution follow Logistic distribution with () as location and shape parameters, using these information can help us getting (number of groups, sample size) associated with reject or accept the Lot
Experimental results for simulated data shows the least number of groups and sample size needs to reject or accept the Lot with certain probability of
... Show MoreThe aim of this study is to estimate the survival function for the data of lung cancer patients, using parametric methods (Weibull, Gumbel, exponential and log-logistic).
Comparisons between the proposed estimation method have been performed using statistical indicator Akaike information Criterion, Akaike information criterion corrected and Bayesian information Criterion, concluding that the survival function for the lung cancer by using Gumbel distribution model is the best. The expected values of the survival function of all estimation methods that are proposed in this study have been decreasing gradually with increasing failure times for lung cancer patients, which means that there is an opposite relationshi
... Show MoreSpeech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.