This field experiment, was conducted to investigate a comparison of two methods for harvesting potatoes: mechanical and handy when using moldboard and chisel plow for primary tillage and three different distances for planting tubers in the rows 15, 25, and 35 cm in silt clay loam soil south of Baghdad. The factorial experiment followed a randomized complete block design with three replications using L.S.D. 5 % and 1 %. Mechanical harvest recorded the best valid potato tubers at 88.78 %, marketable yield of 31.74 ton. ha-1, efficiency lifted 95.68 %, tubers damage index 28.41, speeding up the harvesting process and reducing time and effort. Handy harvest gave the least damage to potato tubers, 6.02 %, and unlifted potato tubers, 4.32 %. However, this method requires effort and more specialized labor, whether from men or young women, and leaded to delays in the harvesting process. Regarding planting distance of 15 cm between one tuber and another gave the highest total productivity, 46.92 ton. ha-1 and the greatest number of plants, but most of the tubers were small in size. A planting distance 25 cm produced good quality in size of potatoes with yield of 36.19 ton. ha-1, 90.99 % best valid tubers, 5.43 % least total damage tubers, 3.57 % least unlifted potato, 96.42 % best efficiency lifting, and least tuber damage index 22.39. Most interaction among the treatments was significant. The most influential factor in the experiment traits was the planting distances of potatoes in the rows. The shape of the potatoes was Spheroid. Mechanical potato harvesting saves effort saves effort, time, harvest speed, reduce the labors and increasing efficiency.
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreVol. 6, Issue 1 (2025)
In this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.
Abstract
In order to determine what type of photovoltaic solar module could best be used in a thermoelectric photovoltaic power generation. Changing in powers due to higher temperatures (25oC, 35oC, and 45oC) have been done for three types of solar modules: monocrystalline , polycrystalline, and copper indium gallium (di) selenide (CIGS). The Prova 200 solar panel analyzer is used for the professional testing of three solar modules at different ambient temperatures; 25oC, 35oC, and 45oC and solar radiation range 100-1000 W/m2. Copper indium gallium (di) selenide module has the lowest power drop (with the average percent
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreCuO-ZnO-Al2O3 catalyst was prepared in the ratios of 20:30:50 respectively, using the coprecipitation method of Cu, Zn and Al carbonates from their nitrate solutions dissolved in distilled water by adding sodium bicarbonate as precipitant.The catalyst was identified by XRD and quantitatively analysis to determine the percentages of its components using flame atomic absorption technique. Also the surface area was measured by BET method. The activity of this prepared catalyst was examined through the oxidation of ethanol to acetaldehyde which was evaluated by gas chromatography.