The technology of subsurface soil water retention (SWRT) uses a polyethylene trough that is fixed under the root zone of the plant. It is a modern technology to increase the values of water use efficiency, plant productivity and saving irrigation water by applying as little irrigation water as possible. This study work aims at improving the crop yield and water use efficiency of a cucumber plant with less applied irrigation water by installing membrane trough below the soil surface. The field experiment was conducted in the Hawr Rajab District of Baghdad Governorate in Winter 2018 for testing various trickle irrigation systems. Two agricultural treatment plots were utilized in a greenhouse for the comparison. Plot T1 has used a subsurface trickle irrigation together with membrane trough. Plot T2 has used only surface trickle irrigation system without using SWRT. The total area of the plots T1and T2 was 13.2 m2 and 6.66 m2, respectively. The obtained results of the study confirmed that the plot T1 satisfies values greater than plot T2 in terms of crop yield, field water use efficiency and in saving the applied irrigation water. The increase rate of field water use efficiency and crop yield in plot T1 compared with plot T2 was 103 %, and 24 %, respectively. Additionally, the increase rate in saving the applied irrigation water in plot T1 comparing with plot T2 was 64 %. The installation of the membrane trough below the plant’s root zone together with subsurface trickle irrigation system assisted in keeping the water, nutrients, and fertilizers during the root zone profile, improving the field water use efficiency and then the parameter of water productivity.
In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreTexture synthesis using genetic algorithms is one way; proposed in the previous research, to synthesis texture in a fast and easy way. In genetic texture synthesis algorithms ,the chromosome consist of random blocks selected manually by the user .However ,this method of selection is highly dependent on the experience of user .Hence, wrong selection of blocks will greatly affect the synthesized texture result. In this paper a new method is suggested for selecting the blocks automatically without the participation of user .The results show that this method of selection eliminates some blending caused from the previous manual method of selection.
<span>We present the linearization of an ultra-wideband low noise amplifier (UWB-LNA) operating from 2GHz to 11GHz through combining two linearization methods. The used linearization techniques are the combination of post-distortion cancellation and derivative-superposition linearization methods. The linearized UWB-LNA shows an improved linearity (IIP3) of +12dBm, a minimum noise figure (NF<sub>min.</sub>) of 3.6dB, input and output insertion losses (S<sub>11</sub> and S<sub>22</sub>) below -9dB over the entire working bandwidth, midband gain of 6dB at 5.8GHz, and overall circuit power consumption of 24mW supplied from a 1.5V voltage source. Both UWB-LNA and linearized UWB-LNA designs are
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreThe photostabilization? of poly vinyl chloride (PVC) ? films has been investigated by using diamine derivatives. The? (PVC) films were? contained 0.5% weight? of diamine derivatives which prepared by the method of casting. The photostabilizations? ?of these compounds were determined by monitoring the carbonyl index value with irradiation time. Also, the effect ?of concentrations of additives (range 0.1-0.5wt) on the rate of photostabilization? process was studied. Therefore we found? that a increased photostabilization rates was increase with increasing? concentrations of compound. Besides, the influence? on film thickness? of photostabilization process was also studied; ?and the results? showed that? the increasing of film thickness incr
... Show More