This field experiment, was conducted to investigate a comparison of two methods for harvesting potatoes: mechanical and handy when using moldboard and chisel plow for primary tillage and three different distances for planting tubers in the rows 15, 25, and 35 cm in silt clay loam soil south of Baghdad. The factorial experiment followed a randomized complete block design with three replications using L.S.D. 5 % and 1 %. Mechanical harvest recorded the best valid potato tubers at 88.78 %, marketable yield of 31.74 ton. ha-1, efficiency lifted 95.68 %, tubers damage index 28.41, speeding up the harvesting process and reducing time and effort. Handy harvest gave the least damage to potato tubers, 6.02 %, and unlifted potato tubers, 4.32 %. However, this method requires effort and more specialized labor, whether from men or young women, and leaded to delays in the harvesting process. Regarding planting distance of 15 cm between one tuber and another gave the highest total productivity, 46.92 ton. ha-1 and the greatest number of plants, but most of the tubers were small in size. A planting distance 25 cm produced good quality in size of potatoes with yield of 36.19 ton. ha-1, 90.99 % best valid tubers, 5.43 % least total damage tubers, 3.57 % least unlifted potato, 96.42 % best efficiency lifting, and least tuber damage index 22.39. Most interaction among the treatments was significant. The most influential factor in the experiment traits was the planting distances of potatoes in the rows. The shape of the potatoes was Spheroid. Mechanical potato harvesting saves effort saves effort, time, harvest speed, reduce the labors and increasing efficiency.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreIn this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.
Let M is a Г-ring. In this paper the concept of orthogonal symmetric higher bi-derivations on semiprime Г-ring is presented and studied and the relations of two symmetric higher bi-derivations on Г-ring are introduced.
The main purpose of this paper is to define generalized Γ-n-derivation, study and investigate some results of generalized Γ-n-derivation on prime Γ-near-ring G and
A Multiple System Biometric System Based on ECG Data
Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.
With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreFractal image compression gives some desirable properties like fast decoding image, and very good rate-distortion curves, but suffers from a high encoding time. In fractal image compression a partitioning of the image into ranges is required. In this work, we introduced good partitioning process by means of merge approach, since some ranges are connected to the others. This paper presents a method to reduce the encoding time of this technique by reducing the number of range blocks based on the computing the statistical measures between them . Experimental results on standard images show that the proposed method yields minimize (decrease) the encoding time and remain the quality results passable visually.