Preferred Language
Articles
/
axbRvosBVTCNdQwCwdo4
Cover Crop Influence on Soil Enzymes and Selected Chemical Parameters for a Claypan Corn–Soybean Rotation
...Show More Authors

Cover crops (CC) improve soil quality, including soil microbial enzymatic activities and soil chemical parameters. Scientific studies conducted in research centers have shown positive effects of CC on soil enzymatic activities; however, studies conducted in farmer fields are lacking in the literature. The objective of this study was to quantify CC effects on soil microbial enzymatic activities (β-glucosidase, β-glucosaminidase, fluorescein diacetate hydrolase, and dehydrogenase) under a corn (Zea mays L.)–soybean (Glycine max (L.) Merr.) rotation. The study was conducted in 2016 and 2018 in Chariton County, Missouri, where CC were first established in 2012. All tested soil enzyme levels were significantly different between 2016 and 2018, irrespective of CC and no cover crop (NCC) treatments. In CC treatment, β-glucosaminidase activity was significantly greater at 0–10 cm depth in 2016 and at 10–20 and 20–30 cm in 2018. In contrast, dehydrogenase activity was significantly greater in NCC in 2018. Soil pH and organic matter (OM) content were found to be significantly greater in CC. Overall, CC have mixed effects on soil enzyme activities and positive effects on soil OM compared to NCC. This study highlights the short-term influence of CC and illustrates the high spatial and temporal variability of soil enzymes under farmer-managed fields.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Causes and Effects of Earnings Management on Stock Prices
...Show More Authors

This study uses the performance of the discretionary estimation models by using a sample of listed companies in the Netherlands and Germany. The actual accounting framework provides a wide opportunity for managers to influence data in financial reporting. The corporate reporting strategy, the way managers use their discretionary accounting, has a significant effect on the company's financial reporting. The authors contribute to the literature through enhancement to these models to accomplish better effects of identifying earnings management as well as to present evidence that is particular to the Dutch and German setting.

For this, we followed the methodology of Dechow, Sloan, and Sweeney (1995) and Chan

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Aci Structural Journal
Experimental and Analytical Study on Punching Shear Strength of BubbleDecks
...Show More Authors

View Publication
Crossref (2)
Clarivate Crossref
Publication Date
Sun Mar 20 2016
Journal Name
Al-mustansiriyah Journal Of Scienc
Histological and cytogenetic effects of Acetamiprid on male albino mice
...Show More Authors

View Publication
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Experimental and Numerical Study on Cavitation Effects in Centrifugal Pumps
...Show More Authors

Experimental and numerical investigations of the centrifugal pump performance at non-cavitating and cavitating flow conditions were carried out in the present study. Experiments were performed by applying a vacuum to a closed-loop system to investigate the effects of the net positive suction head available (NPSHa), flow rate, water temperature and pump speed on the centrifugal pump performance. Accordingly, many of the important parameters concerning cavitation phenomenon were calculated. Also, the noise which is accompanied by cavitation was measured. Numerical analysis was implemented for two phase flow (the water and its vapor) using a 2-D simulation by ANSYS FLUENT software to investigate the internal flow of centrifugal pump under c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Asian Pacific Journal Of Cancer Prevention
Development of a T-ARMS-PCR Assay for Detecting Genetic Polymorphism in the Catalase (rs7943316) Gene in the Iraqi Population with Breast Cancer
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Crossref