Preferred Language
Articles
/
joe-1332
Numerical Simulation of Water Distribution with Uptake Root in Drip Irrigation using Different Soil Hydraulic Models
...Show More Authors

Surface drip irrigation is one of the most conservative irrigation techniques that help control providing water directly on the soil through the emitters. It can supply fertilizer and providing water directly to plant roots by drippers. One of the essential needs for trickle irrigation nowadays is to obtain more knowledge about the moisture pattern under the trickling source for various types of soil with various discharge levels with trickle irrigation. Simulation numerical using HYDRUS-2D software, version 2.04 was used to estimate an equation for the wetted area from a single surface drip irrigation in unsaturated soil is taking into account water uptake by roots. In this paper, using two soil types were used, namely sandy loam and clay loam, with three types of plants; (corn, tomato, and sweet sorghum). The soil wetting pattern was analyzed each half an hour for three hours of irrigation time and three initial soil moisture content. Equations for wetted radius and wetted depth were predicted and evaluated by utilizing the statistical parameters for the different hydraulic soil models (Model Efficiency (EF) and Root Mean Squares Error (RMSE)). The values RMSE does not exceed 0.40 cm, and EF is greater than 0.96 for all types of soil. These values were between the values obtained from program  HYDRUS-2D and the values obtained from formulas. This shows that evolved formula can be utilized to describe the soil wetting pattern from the surface drip irrigation system. The relative error for the different hydraulic soil models was calculated and compared with Brooks and Corey's model, 1964. There was good agreement compared with different models. RMSE was 0.23 cm, while the relative error -1% and 1 for EF for wetted radius.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 10 2022
Journal Name
International Journal Of Mathematics In Operational Research
Modelling time-series process of an agricultural crop production process by EWMA quality control chart
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of educational institutions and regulatory bodies to reduce the financial and administrative corruption
...Show More Authors

This research seeks to clarify the regulatory and educational role of the regulatory and educational institutions in reducing the phenomenon of financial and administrative corruption as a dangerous phenomenon of the communities, as it touched search kinds of financial and administrative corruption and the causes and effects, as well as to the role of educational institutions in reducing this phenomenon, and finally between experiments some SAIs and accounting Arab and foreign countries on how to reduce the phenomenon of financial and administrative corruption.The research aims to several targets which shed light on the role of educational and supervisory institutions in reducing corruption, a statement origins and evolution of and justi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A proposed program to audit the performance of the hotel sector under crises (Applied Research)
...Show More Authors

Abstract:

        The research sought to identify the crises that occurred during the research period and their reflection on the performance of the hotel Research sample as well as to identify the reality of auditing the hotel Research sample and the preparation of a performance audit program can be adopted in auditing the performance of hotels in light of crises, and the problem of the research lies in the lack of a program to audit the performance of hotels that takes into account the crises experienced by the hotel sector, The research was based on solving its problems on three hypotheses, the first is that the performance audit in light of the Covid-19 pand

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Synthesis and Characterization of Some New Nucleoside Analogues from Substituted Benzimidazole via 1,3-Dipolar cycloaddition
...Show More Authors

This paper includes the synthesis of some new nucleoside analogues starting with 2-substituted benzimidazole derivative (7-9), that synthesized by condensation of O-phenylenediamine with p-chloro benzaldehyde and two substituted benzoic acid , which on nucleophilic substitution with propargyl bromide gave a new N-substituted compounds (10-12). D-Fructose and D-galactose were chosen as a sugar moiety which were protected, brominated and azotated to give azido sugars (5) and (6), then they were subjected to 1,3-dipolar cycloaddition reaction with N-substuted compounds afforded bloked nucleoside analoges (13-16), which after hydrolysis gave our target the free nucleoside analogues (17-20). All prepared compounds were identified by FT-IR

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Der Pharmacia Lettre
Synthesis, characterization and anticonvulsant evaluation of new derivatives derived from 5-methoxy-2-mercapto benzimidazole
...Show More Authors

A new series of 5-methoxy-2-mercapto benzimidazole derivatives were synthesized by the reaction of 5-methoxy- 2-mercaptobenzimidazole with chloroacetic acid and affords 2-((5-methoxy-1H-benzo[d]imidazol-2-yl)thio) acetic acid (1),which on cyclization with acetic anhydride and pyridine gives 7- methoxybenzo[4,5]imidazo[2,1-b]thiazol- 3(2H)-one(2), which on condensation with different aryl aldehydes in the presence of anhydrous sodium acetate in glacial acetic acid, furnishes a arylidene thiazolidinone. The purity of the synthesized compounds was confirmed by melting point and TLC.The structures were established by different spectral analysis such as FTIR,1HNMR, and CHN analysis. The newly synthesized compounds (3a-d) were in vivo evaluated f

... Show More
View Publication Preview PDF
Scopus (4)
Scopus
Publication Date
Tue Jan 30 2024
Journal Name
International Journal Of Engineering Pedagogy
Information and Communication Technology and its Impact on Improving the Quality of Engineering Education Systems
...Show More Authors

Scopus (5)
Scopus
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of cognitive sharing on strategic anxiety: Analytical research into the Iraqi Airways Company
...Show More Authors

The current research aims to test the effect of knowledge sharing in its dimensions represented by(individual dimension, organizational dimension, and technological dimension), In reducing the strategic Anxiety of Iraqi Airways, In view of the importance of the two variables for the company from the perspective of society and the sample resulting from directing various organizational phenomena to reduce its strategic Anxiety, As a goal, it should be viewed from multifaceted perspectives(uncertainty, relational disorder, competitive disorder, resource depletion), And it was embodied by choosing the descriptive, exploratory approach, as it is the most appropriate in that aspect, so that the research questionnaire is one of solid scientific

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 29 2023
Journal Name
Research Journal Of Pharmacy And Technology
The Wound Healing effect of the Green Synthesized Iron Oxide Nanoparticles: A Study on Mice
...Show More Authors

The extract of fig fruit has shown significant medical usefulness in various fields. The entrance of nanotechnology into the field of medicinal and pharmacology has shown remarkable advantages. Plants contain diverse molecules thatcan reduce metals, and provide a safe, eco-friendly approach for synthesizing nanoparticles. Iron oxide nanoparticles (IONPs) have been reported to possess an antimicrobial effect against some strains of bacteria and moulds. We have aimed to synthesize IONPs from fig fruit extract and investigate the influence of fig extract and IONPs in wound healing of mice. UV-Vis spectroscopy, X-ray diffraction (XRD), and field emission scanning electron microscopy were used to characterize the IONPs that were produced

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
Phenolic Content and Antioxidant, Antibacterial Activities of Ethanolic Extract From Lemon Balm and Oregano Plants
...Show More Authors

The antioxidant and antibacterial activities of ethanolic extract and phenolic compounds extract of Lemon balm (Melissa officinalis) and Oregano (Oreganum vulgare) plants were studied; the phenolic content and the relationship between these compounds and the above activities were also investigated. The results showed that the Lemon balm had the highest phenolic content (56.5% mg g) and the phenolic content of Oregano was twice lower than Lemon balm. Lemon balm has the highest antioxidant activity which causes lipid peroxidation inhibition activity of linoleic acid (90.5%), this activity was more than ?-tocopherole antioxidant activity (79.3 %). It was found that the main source of antioxidant activity o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref