Preferred Language
Articles
/
cxcZ444BVTCNdQwCnln4
Subsurface Water Retention a Technology for Increasing the Field Use Efficiency and Water Saving Values of Cucumber Plant
...Show More Authors

The technology of subsurface soil water retention (SWRT) uses a polyethylene trough that is fixed under the root zone of the plant. It is a modern technology to increase the values of water use efficiency, plant productivity and saving irrigation water by applying as little irrigation water as possible. This study work aims at improving the crop yield and water use efficiency of a cucumber plant with less applied irrigation water by installing membrane trough below the soil surface. The field experiment was conducted in the Hawr Rajab District of Baghdad Governorate in Winter 2018 for testing various trickle irrigation systems. Two agricultural treatment plots were utilized in a greenhouse for the comparison. Plot T1 has used a subsurface trickle irrigation together with membrane trough. Plot T2 has used only surface trickle irrigation system without using SWRT. The total area of the plots T1and T2 was 13.2 m2 and 6.66 m2, respectively. The obtained results of the study confirmed that the plot T1 satisfies values greater than plot T2 in terms of crop yield, field water use efficiency and in saving the applied irrigation water. The increase rate of field water use efficiency and crop yield in plot T1 compared with plot T2 was 103 %, and 24 %, respectively. Additionally, the increase rate in saving the applied irrigation water in plot T1 comparing with plot T2 was 64 %. The installation of the membrane trough below the plant’s root zone together with subsurface trickle irrigation system assisted in keeping the water, nutrients, and fertilizers during the root zone profile, improving the field water use efficiency and then the parameter of water productivity.

Crossref
View Publication
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of Addition of Combination of Plasma Treated Polyester and Polyamide Fibers on Surface Roughness and Some Mechanical Properties of Heat Cured Acrylic Resin
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Thu Mar 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of Addition of Combination of Plasma Treated Polyester and Polyamide Fibers on Surface Roughness and Some Mechanical Properties of Heat Cured Acrylic Resin
...Show More Authors

Background: Poly (methyl methacrylate) has several disadvantages (poor mechanical properties) like impact and transverse strength. In order to overcome these disadvantages, several methods were used to strengthen the acrylic resin by using different fibers or fillers. This study was conducted to evaluate the effect of Plasma treatment of the fiber on mechanical properties Poly (methyl methacrylate) denture base material. Materials and methods: Specimens were prepared from poly methyl metha acrylic (PMMA) divided according to present of fiber into 4 groups (first group without fiber as control group, second group with Plasma treated polyester fibers, third group with Plasma treated polyamide fibers and fourth group Plasma treated combination

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Fri Sep 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis, Characterization and Studying the Enzyme Activity of New Benzothiazole Schiff Base Ligand (HL) and Its Complexes with Some of Metal Ions
...Show More Authors