A field experiment was carried out during the 2020 season at the College of Agricultural Engineering/ University of Baghdad, Al-Jadriya to evaluate the effect of dry farming when applying water stress under the subsurface drip irrigation system on water productivity and rice yield. The experiment was conducted with three levels of irrigation water stress when 10, 20 and 40% of the available water was depleted and in three dimensions between drip lines 10, 15 and 20 cm. The experiment was designed according to a randomized complete block design, according to the split plot design, with three replications. Determine the depth of irrigation water depending on the moisture depletion of the soil, the results showed a difference in the depth of water according to the moisture depletion, which amounted to 900 mm. Season-1 treatment for 10% depletion and decreased to 10 and 16.6% when 20 and 40% of the prepared water was depleted, respectively. The intervention between drip lines and irrigation treatments led to a significant increase in grain yield when using a distance of 10 cm and irrigation when 10% of the available water was depleted. There were no significant differences in grain yield at I10 despite the difference in the distance between the drip lines. The efficiency of field and crop water use and the profitability of water outperformed I10.
The Journal of Studies and Researches of Sport Education (JSRSE)
Most of the mosques in the Islamic world fall under specific and known forms and patterns to a large extent, and such patterns have grown and evolved from the few basic and uniform models, but they changed slowly due to the impact with a mixture of changing functional requirements and cultural landscapes because of the variables of time and place to form patterns known and famous in this day across parts of the Islamic world and its borders. There was no exception to these patterns, but small numbers of mosques that were probably the result of personal experiences or improvisational resolutions, or in response to specific or temporary stimuli. However, the emergence of a specific pattern which does not belong to any of these patt
... Show MoreCdSe alloy has been prepared successfully from its high purity elements. Thin films of this alloy with different thicknesses (300,700)nm have been grown on glass substrates at room temperature under very low pressure (10-5)Torr with rate of deposition (1.7)nm/sec by thermal evaporation technique, after that these thin films have been heat treated under low pressure (10-2)Torr at (473,673)K for one hour. X-ray patterns showed that both CdSe alloy and thin films are polycrystalline and have the hexagonal structure with preferential orientation in the [100] and [002] direction respectively. The optical measurements indicated that CdSe thin films have allowed direct optical energy band gap, and it increases from (1.77- 1.84) eV and from
... Show MoreCdSe alloy has been prepared successfully from its high purity elements. Thin films of this alloy with different thicknesses (300,700)nm have been grown on glass substrates at room temperature under very low pressure (10-5)Torr with rate of deposition (1.7)nm/sec by thermal evaporation technique, after that these thin films have been heat treated under low pressure (10-2)Torr at (473,673)K for one hour. X-ray patterns showed that both CdSe alloy and thin films are polycrystalline and have the hexagonal structure with preferential orientation in the [100] and [002] direction respectively. The optical measurements indicated that CdSe thin films have allowed direct optical energy band gap, and it increases from (1.771.84) eV and from (1.6-1
... Show MoreIron is one of the abundant elements on earth that is an essential element for humans and may be a troublesome element in water supplies. In this research an AAN model was developed to predict iron concentrations in the location of Al- Wahda water treatment plant in Baghdad city by water quality assessment of iron concentrations at seven WTPs up stream Tigris River. SPSS software was used to build the ANN model. The input data were iron concentrations in the raw water for the period 2004-2011. The results indicated the best model predicted Iron concentrations at Al-Wahda WTP with a coefficient of determination 0.9142. The model used one hidden layer with two nodes and the testing error was 0.834. The ANN model coul
... Show MoreEach sport has its own energy requirements that differ from the energy requirements of other sports, and a different method is used in each of them, so the trainer must first rely on the principle of privacy in training first, that is, privacy according to the working energy system, that is, he defines the controlling energy system In that event, and how the muscles use the available energy to perform according to the energy production systems. As we find the serving skill is the first volleyball skill with which the team starts the match in order to be able to gain points directly, through knowledge it turns out that there is a weakness in the skill performance, especially the skill of serving and being The key to victory for volle
... Show MoreBreast cancer (BC) is the most common malignant tumor in women and the leading cause of cancer deaths worldwide. This work was conducted to estimate the roles of oxidative stress, vitamin B12, homocysteine (HCY), and DNA methylation in BC disease progression. Sixty BC patients (age range 33–80 years) and 30 healthy controls were recruited for this study. Patients with BC were split to group 1 consisted of stage II BC women (low level), and group 2 consisted of patients in stages III and IV (high level). Malondialdehyde (MDA), glutathione peroxidase 3 (GPX3), HCY, and vitamin B12 levels in the study groups were measured. Also, the 5-methylcytosine (5mC) global DNA methylation levels were evaluated. The results showed a significant
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More