Soil water use and water storage vary by vegetative management practices, and these practices affect land productivity and hydrologic processes. This study investigated the effects of agroforestry buffers (AB), grass buffers (GB), and biofuel crops (BC), relative to row crops (RC) on soil water use for a claypan soil in northern Missouri, USA. The experiment located at the Greenley Memorial Research Center included RC, AB, GB, and BC established in 1991, 1997, 1997, and 2012, respectively. Soil water reflectometer sensors installed at 5‐, 10‐, 20‐, and 40‐cm depths monitored soil water from April to November in 2017 and 2018. Results showed significant differences in weekly volumetric water content (VWC) among treatments for all four soil depths in 2017 and 2018. Treatments of AB, GB, and BC had lower VWC (16, 37, and 18% on 9 June), (31, 35, and 20% on 18 August), and (43, 49, and 35% on 29 September) in 2017 and (46, 70, and 19% on 24 August) and (31, 34, and 17% on 5 October) in 2018, respectively, in the pre‐recharge periods for the 5‐cm depth compared with the RC. In the post‐recharge period, equal or occasionally slightly higher soil water occurred in the buffer and biofuel treatments compared to the RC. During recharge, larger increases in soil water due to better infiltration were observed in the perennial vegetative practices relative to RC. The results showed that these practices could significantly influence soil water use and storage compared to RC management, especially for eroded claypan landscapes.
Trickle irrigation is one of the most conservative irrigation techniques since it implies supplying water directly on the soil through emitters. Emitters dissipate energy of water at the end of the trickle irrigation system and provide water at emission points. The area wetted by an emitter depends upon the discharge of emitter, soil texture, initial soil water content, and soil permeability. The objectives of this research were to predict water distribution profiles through different soils for different conditions and quantify the distribution profiles in terms of main characteristics of soil and emitter. The wetting patterns were simulated at the end of each hour for a total time of application of 12 hrs, emitter disch
... Show MoreIn this work the production of activated carbon (AC) from Imperata is done by microwave assisted Potassium hydroxide (KOH) activation and using this activated carbon for the purpose of the uptake of amoxicillin (AMX) by adsorption process from aqueous solution. The effects for irradiation power (450-800W), irradiation time (6-12min) as well as impregnation ratio (0.5-1 g/g) on the AMX uptake and yield AMX uptake at an initial concentration of AMX (150 mg/g). The optimum conditions were 700 W irradiation power, 10 min time of irradiation, as well as 0.8 g/g impregnation ratio with 14.821% yield and 12.456 mg/g AMX uptake. Total volume of hole and the area of the surface (BET) are 0.3027 m³/g, and 552.7638 m²/g respectively. The properti
... Show MoreTigris River is one of the main important surface water resources in Iraq. This necessitates continuous study of its quality . The present study is concerned with the characteristics and quality of Tigris water passing through in Baghdad city. (eight) samples were collected from the river in the area Grea't City. The study periods were carried over four season, which has been sampled once represent the every season. First sampling 12-11-2012 represent the autumn season The second sampling 20-1-2013 to represent the winter season. The third in 25-3- 2013 to represent the Springer season. The fourth during 29-5-2013 to represent the summer spring season. In order to specify the water quality, a group of physical and chemical analyses have bee
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreWater flow into unsaturated porous media is governed by the Richards’ partial differential equation expressing the mass conservation and Darcy’s laws. The Richards’ equation may be written in three forms,where the dependent variable is pressure head or moisture content, and the constitutive relationships between water content and pressure head allow for conversion of one form into the other. In the present paper, the “moisture-based" form of Richards’ equation is linearized by applying Kirchhoff’s transformation, which
combines the soil water diffusivity and soil water content. Then the similarity method is used to obtain the analytical solution of wetting front position. This exact solution is obtained by means of Lie’s
The objective of this article is to delve into the intricate dynamics of marriage relationships, exploring the impact of emotions such as fear, love, financial considerations and likability. In our investigation, we adopt a perspective that acknowledges the nonlinear nature of interactions among individuals. Diverging from certain prior studies, we propose that the fear element within the context of marriage is not a singular, isolated factor but rather a manifestation resulting from the amalgamation of numerous social issues. This, in turn, contributes to the emergence of strained and unsuccessful relationships. Unlike conventional approaches, we extensively examine the conditions essential for the existence of all socially signifi
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More