Preferred Language
Articles
/
joe-1332
Numerical Simulation of Water Distribution with Uptake Root in Drip Irrigation using Different Soil Hydraulic Models
...Show More Authors

Surface drip irrigation is one of the most conservative irrigation techniques that help control providing water directly on the soil through the emitters. It can supply fertilizer and providing water directly to plant roots by drippers. One of the essential needs for trickle irrigation nowadays is to obtain more knowledge about the moisture pattern under the trickling source for various types of soil with various discharge levels with trickle irrigation. Simulation numerical using HYDRUS-2D software, version 2.04 was used to estimate an equation for the wetted area from a single surface drip irrigation in unsaturated soil is taking into account water uptake by roots. In this paper, using two soil types were used, namely sandy loam and clay loam, with three types of plants; (corn, tomato, and sweet sorghum). The soil wetting pattern was analyzed each half an hour for three hours of irrigation time and three initial soil moisture content. Equations for wetted radius and wetted depth were predicted and evaluated by utilizing the statistical parameters for the different hydraulic soil models (Model Efficiency (EF) and Root Mean Squares Error (RMSE)). The values RMSE does not exceed 0.40 cm, and EF is greater than 0.96 for all types of soil. These values were between the values obtained from program  HYDRUS-2D and the values obtained from formulas. This shows that evolved formula can be utilized to describe the soil wetting pattern from the surface drip irrigation system. The relative error for the different hydraulic soil models was calculated and compared with Brooks and Corey's model, 1964. There was good agreement compared with different models. RMSE was 0.23 cm, while the relative error -1% and 1 for EF for wetted radius.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Using Some Robust Methods For Handling the Problem of Multicollinearity
...Show More Authors

The multiple linear regression model is an important regression model that has attracted many researchers in different fields including applied mathematics, business, medicine, and social sciences , Linear regression models involving a large number of independent variables are poorly performing due to large variation and lead to inaccurate conclusions , One of the most important problems in the regression analysis is the multicollinearity Problem, which is considered one of the most important problems that has become known to many researchers  , As well as their effects on the multiple linear regression model, In addition to multicollinearity, the problem of outliers in data is one of the difficulties in constructing the reg

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 01 2025
Journal Name
Journal Of Engineering
Transient Response Investigation of Cross-Ply Plates Using Refined Theory
...Show More Authors

Response of cross-ply plates subjected to transient load is obtained using five variables refined plate theory, and four variables plate theory. Equations of motion are derived through the principleof virtual work. Navier series used for simply supported laminated plates. The results of this work are presented for different parameters, such as the ply number, thickness, and modulus ratio with mechanical load (sinusoidal and step pulses), which are compared with those obtained using high-order shear plate theory. Five variables of refined plate theory give results that are considerably different from the four variables of refined plate theory and higher-order theory. The obtained results from the four variables theory have the same behavior

... Show More
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 09 2021
Journal Name
Applied System Innovation
Design and Optimization of Vertical Axis Wind Turbines Using QBlade
...Show More Authors

Wind energy is considered one of the most important sources of renewable energy in the world, because it contributes to reducing the negative effects on the environment. The most important types of wind turbines are horizontal and vertical axis wind turbines. This work presents the full details of design for vertical axis wind turbine (VAWT) and how to find the optimal values of necessary factors. Additionally, the results shed light on the efficiency and performance of the VAWT under different working conditions. It was taken into consideration the variety of surrounding environmental conditions (such as density and viscosity of fluid, number of elements of the blade, etc.) to simulate the working of vertical wind turbines under di

... Show More
Scopus (23)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Image Zooming Using Inverse Slantlet Transform
...Show More Authors

Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.

      First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the   signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by  box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .

  &nbs

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Reinforce organizational communication using Information Technology
...Show More Authors
Abstract<p>The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 03 2024
Journal Name
The Science Teacher
Using Scenarios to Assess Student Learning
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref