Preferred Language
Articles
/
KxZZDIwBVTCNdQwCCPcZ
High throughput screening of rooting depth in rice using buried herbicide
...Show More Authors
Abstract<p>Root research requires high throughput phenotyping methods that provide meaningful information on root depth if the full potential of the genomic revolution is to be translated into strategies that maximise the capture of water deep in soils by crops. A very simple, low cost method of assessing root depth of seedlings using a layer of herbicide (<styled-content style="fixed-case">TRIK</styled-content> or diuron) buried 25 or 30 cm deep in soil‐filled boxes of varying size is described that is suitable for screening hundreds or thousands of rice accessions in controlled environment conditions. Variation in cultivar sensitivity to the herbicide when injected into pots was detected but considered small in relation to the variation detected when the herbicide was buried. Using 32 rice cultivars previously characterised for root traits in rhizotron and hydroponic systems, 80% of variation in herbicide score at 35 days was explained by cultivar and herbicide score correlated strongly with rooting depth traits. Using 139 genotypes of the Bala × Azucena mapping population, heritability for herbicide symptoms reached 55% and quantitative trait loci were detected which match those previously reported in this population. In repeated experiments using different soils, the method did not always perform to its maximum potential (in terms of speed of symptom development or discrimination between cultivars). This was not due to degradation or reduced bio‐availability of the herbicide in the soil but is believed to be due to the soil water content and water release characteristics as it relates to plant water use. Therefore, when using this technique, thorough preliminary experiments to determine the best water application regime for the particular combination of soil and environmental conditions are required. The method should be applicable to seedling stage screening of rice and other crops.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jun 01 2022
Journal Name
V. International Scientific Congress Of Pure, Applied And Technological Sciences
Lightweight Image Compression Using Polynomial and Transform Coding
...Show More Authors

Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
Directive and Steerable Radiation Pattern using SASPA Array
...Show More Authors

This work examines the ability of a special type of smart antenna array known as Switched Active Switched Parasitic Antenna (SASPA) to produce a directive and electronically steerable radiation pattern. The SASPA array consists of antenna elements that are switchable between active and parasitic states by using P-Intrinsic-N (PIN) diodes. The active element is the element that is supplied by the radio frequency while short-circuiting the terminals of an element in the array results in a parasitic element. Due to the strong mutual coupling between the elements, a directional radiation pattern with high gain and a small beamwidth can be produced with only one active element operating at a time. By changing the parasitic state to the active

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Al-nahrain University Science
Breaking Knapsack Cipher Using Population Based Incremental Learning
...Show More Authors

View Publication
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Nurse Scheduling Problem Using Hybrid Simulated Annealing Algorithm
...Show More Authors

Nurse scheduling problem is one of combinatorial optimization problems and it is one of NP-Hard problems which is difficult to be solved as optimal solution. In this paper, we had created an proposed algorithm which it is hybrid simulated annealing algorithm to solve nurse scheduling problem, developed the simulated annealing algorithm and Genetic algorithm. We can note that the proposed algorithm (Hybrid simulated Annealing Algorithm(GS-h)) is the best method among other methods which it is used in this paper because it satisfied minimum average of the total cost and maximum number of Solved , Best and Optimal problems. So we can note that the ratios of the optimal solution are 77% for the proposed algorithm(GS-h), 28.75% for Si

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Image Compression using Polynomial Coding Techniques: A review
...Show More Authors

Publication Date
Sun Mar 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation Liquid Permeability Using Air Permeability Laboratory Data
...Show More Authors

Permeability data has major importance work that should be handled in all reservoir simulation studies. The importance of permeability data increases in mature oil and gas fields due to its sensitivity for the requirements of some specific improved recoveries. However, the industry has a huge source of data of air permeability measurements against little number of liquid permeability values. This is due to the relatively high cost of special core analysis.
The current study suggests a correlation to convert air permeability data that are conventionally measured during laboratory core analysis into liquid permeability. This correlation introduces a feasible estimation in cases of data loose and poorly consolidated formations, or in cas

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Mass Transfer Enhancement Using Extensions as Turbulence Promoters
...Show More Authors

Mass transfer was studied using a rotating cylinder electrode with different lengths of legs acting as turbulence promoters. Two types of rotating cylinder ,made of brass, were examined : an enhanced cylinder one, with four rectangular extensions 10 mm long, 10 mm wide, and 1mm thick, and an enhanced cylinder two with four longitudes 30 mm long,10 mm wide, and 1mm thick. The best performance was obtained for enhanced cylinder two at low rotation speeds while enhanced cylinder one was realized at high rotation speeds. The mass transfer enhancement as compared with a normal rotating cylinder electrode, devoid of promoters, is 53% or 58% higher. The enhancement percentage decreased as rotation speeds increased further, since, seemingly, ful

... Show More
View Publication Preview PDF