This field experiment was conducted at Research Station B, Department of Horticulture and Landscape Engineering, College of Agricultural Engineering Sciences, University of Baghdad, Jadiriyah during the fall season of 2019-2020 to evaluate the effect of cultivation dates and soil fertilization source on the growth, yield and quality of broccoli. A split plot design within the RCBD design with three replicates was applied as the Max F1 hybrid broccoli seedlings were transferred to the field at two dates 25, Sep. 2019 and 15, Oct. 2019, which were symbolized as A and B, respectively, and occupied at the main plot. After two weeks of cultivation, the soil fertilizers were applied three times during the season in 20 days between each applicati
... Show MoreDifferent coating layers of fluorescent agent (FCA) on the solar cells were used. An increase of 35% in the energy conversion efficiency of the solar cell have been obtained. This increase is attributed to the reduction ofthe reflected light, eflection spectra show low values at higher thickness which explained the increase ofthe conversion efficiency with increases of layer thickness.
To maintain a sustained competitive position in the contemporary environment of knowledge economy, organizations as an open social systems must have an ability to learn and know how to adapt to rapid changes in a proper fashion so that organizational objectives will be achieved efficiently and effectively. A multilevel approach is adopted proposing that organizational learning suffers from the lack of interest about the strategic competitive performance of the organization. This remains implicit almost in all models of organizational learning and there is little focus on how learning organizations achieve sustainable competitive advantage . A dynamic model that captures t
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show More