The best design of subsurface trickle irrigation systems requires knowledge of water and salt distribution patterns around the emitters that match the root extraction and minimize water losses. The transient distribution of water and salt in a two-dimensional homogeneous Iraqi soil domain under subsurface trickle irrigation with different settings of an emitter is investigated numerically using 2D-HYDRUS software. Three types of Iraqi soil were selected. The effect of altering different values of water application rate and initial soil water content was investigated in the developed model. The coefficient of correlation (R2) and the root-mean-square error (RMSE) was used to validate the predicted numerical result. This statistical analysis revealed that there was no much difference between the predicted numerical results, and the measured values. R2 varied from 0.75 to 0.93 and the (RMSE) from 0.079 to 0.116. The comparison confirms the accuracy of the developed model, and it shows that it can be used to simulate the front wetting patterns of water and salt distribution under subsurface trickle irrigation systems. The simulation outcome showed that as the distance from the emitter increased, soil salinity far from the emitter decreased. As expected, irrigation duration and amount affects the dimension of the solute distribution.
Abstract
The research aims at the relationship between Servant leadership dimensions test as an independent variable and an organizational trust as a variable dependent. Thus it was necessary to answer the following question: Is there a correlation relationship and impact between Servant leadership dimensions and organizational trust? To investigate the contents of the answer, the researcher selected a group of employees in Oil Products Distribution Company / Baghdad. The researcher adopted the analytical descriptive approach in completing his research which dealt with a random sample of (190) individuals representing the research society out of the total number of (376) person from the middle and high Leaders. Depending
... Show MoreIn this study, the stable isotop 18O and 2H has been used to investigate the interaction of surface water (SW), and groundwater (GW) in Al-Taji district/ Northern Baghdad for two seasons (March and August 2022). 16 Samples were collected from water resources in the Al-Taji district (Tigris channel, Tigris River, and groundwater), in each season water samples from 8 Tigris channel, 5 drilled wells, and 3 Tigris River were taken for the analysis of the isotopes 18O and 2H. The average analysis results of 18O and 2H in the Tigris channel, Tigris River, and groundwater were found to be -3.435‰ and -18.6094‰, -2.07167‰ and -17.81‰, -4.125‰ and -34.707‰ respectively. The results, generally, show a comparable range of isotope c
... Show MoreA reliability system of the multi-component stress-strength model R(s,k) will be considered in the present paper ,when the stress and strength are independent and non-identically distribution have the Exponentiated Family Distribution(FED) with the unknown shape parameter α and known scale parameter λ equal to two and parameter θ equal to three. Different estimation methods of R(s,k) were introduced corresponding to Maximum likelihood and Shrinkage estimators. Comparisons among the suggested estimators were prepared depending on simulation established on mean squared error (MSE) criteria.
This paper deals with the ideological positioning of the English poet John Donne in a selected poems of his i.e Holy Sonnet X, as regards the theme of death found therein. The researchers adopt an emerging branch of stylistics, called Critical Stylistics, as proposed by Jeffries (2010) in order to uncover the ideologies of the author regarding the topic concerned and how linguistic choices are used to slant ideas. The model is comprised of ten tools of analysis which, upon being applied to the selected data, have shown how the poet exploits language resources in order to pass his ideology and influence his readers. In this paper, the workings of only one tool are presented as applied to a certain portion of the data.
A Destructive Parenthood : The Problematic Motherhood in Selected Poems by Salvia Plath
In addition to its basic communicative function, language can be used to imply information that is not actually stated, i.e. addressers do not always state exactly (or directly) what they mean. Such instances fall within the domain of pragmatics in that they have to do with how addressers use language to communicate in a particular situation by implication rather than by direct statement. The researcher attempts to demonstrate that the beauty and the multiple layers of meaning in poetry can be better explored if the addressee looks at the lines from a pragmatic perspective in search for implied meaning. There are many devices that can convey implied meaning in poetry, among which are 'rhetorical', 'figurative' or 'literary' devices. But
... Show MoreIn the current study, the researchers have been obtained Bayes estimators for the shape and scale parameters of Gamma distribution under the precautionary loss function, assuming the priors, represented by Gamma and Exponential priors for the shape and scale parameters respectively. Moment, Maximum likelihood estimators and Lindley’s approximation have been used effectively in Bayesian estimation.
Based on Monte Carlo simulation method, those estimators are compared depending on the mean squared errors (MSE’s). The results show that, the performance of Bayes estimator under precautionary loss function with Gamma and Exponential priors is better than other estimates in all cases.
In this paper, we used the maximum likelihood estimation method to find the estimation values ​​for survival and hazard rate functions of the Exponential Rayleigh distribution based on a sample of the real data for lung cancer and stomach cancer obtained from the Iraqi Ministry of Health and Environment, Department of Medical City, Tumor Teaching Hospital, depending on patients' diagnosis records and number of days the patient remains in the hospital until his death.
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More