Preferred Language
Articles
/
joe-1332
Numerical Simulation of Water Distribution with Uptake Root in Drip Irrigation using Different Soil Hydraulic Models
...Show More Authors

Surface drip irrigation is one of the most conservative irrigation techniques that help control providing water directly on the soil through the emitters. It can supply fertilizer and providing water directly to plant roots by drippers. One of the essential needs for trickle irrigation nowadays is to obtain more knowledge about the moisture pattern under the trickling source for various types of soil with various discharge levels with trickle irrigation. Simulation numerical using HYDRUS-2D software, version 2.04 was used to estimate an equation for the wetted area from a single surface drip irrigation in unsaturated soil is taking into account water uptake by roots. In this paper, using two soil types were used, namely sandy loam and clay loam, with three types of plants; (corn, tomato, and sweet sorghum). The soil wetting pattern was analyzed each half an hour for three hours of irrigation time and three initial soil moisture content. Equations for wetted radius and wetted depth were predicted and evaluated by utilizing the statistical parameters for the different hydraulic soil models (Model Efficiency (EF) and Root Mean Squares Error (RMSE)). The values RMSE does not exceed 0.40 cm, and EF is greater than 0.96 for all types of soil. These values were between the values obtained from program  HYDRUS-2D and the values obtained from formulas. This shows that evolved formula can be utilized to describe the soil wetting pattern from the surface drip irrigation system. The relative error for the different hydraulic soil models was calculated and compared with Brooks and Corey's model, 1964. There was good agreement compared with different models. RMSE was 0.23 cm, while the relative error -1% and 1 for EF for wetted radius.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 02 2025
Journal Name
International Journal Of Biology And Chemistry
Preparation and Characterization of Nano-Iron Oxide by using Iraqi Orange Plant Extract and Testing for Adsorption Efficiency
...Show More Authors

Nanomaterials, including nanoparticles such as iron oxide nanoparticles, have received great attention from researchers due to their unique properties and applications. There are several diverse methods, including chemical, physical, and green biological methods, to prepare iron oxide nanoparticles. The green method was chosen because it is safer, purer, and less toxic compared to other methods. Therefore, the green method is a promising and environmentally friendly method in the near future. The aqueous extract of Iraqi orange leaves was used to prepare nano iron oxide, it was examined structurally and spectrally by several techniques (X-ray diffraction- XRD, Fourier transform infrared - FT-IR, field emission scanning electron micr

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Nov 07 2023
Journal Name
Innovative Infrastructure Solutions
Enhancing load-bearing performance of hybrid recycled aggregate concrete-filled columns using SBR, steel fibers and polypropylene fibers
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and characterization of Posaconazole as a Nano-micelles using d-α-Tocopheryl polyethylene glycol 1000 succinate (TPGS)
...Show More Authors

It is important to note that Posaconazole (POCZ) is a newly developed extended-spectrum triazole that belongs to BCS class II and has a solubility of less than 1µg/ml. In patients with a weakened immune system, POCZ has been shown to be effective as an antifungal treatment for invasive infections caused by candida and aspergillus species. The nano-micelles technique can be used to increase POCZ solubility. In order to increase their apparent solubility in water, nano-micelles are made by combining macromolecules that self-assemble into ordered structures capable of entrapping hydrophobic drug molecules in the interior domain. Dispersed colloidal systems, of which nano-micelles are a subset, are a large and diverse group. Composed of a p

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Wed Oct 01 2025
Journal Name
Chinese Journal Of Analytical Chemistry
Synthesis, characterization, antioxidant and bioactivity assessment, and thermodynamic analysis of metal ion complexes using a novel azo dye
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Fri Feb 25 2022
Journal Name
Heat And Mass Transfer
Optimization, equilibrium, kinetics and thermodynamic study of congo red dye adsorption from aqueous solutions using iraqi porcelanite rocks
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Mon Sep 01 2014
Journal Name
Al-khwarizmi Engineering Journal
Trajectory Tracking Control for a Wheeled Mobile Robot Using Fractional Order PIaDb Controller
...Show More Authors

Nowadays, Wheeled Mobile Robots (WMRs) have found many applications as industry, transportation, inspection, and other fields. Therefore, the trajectory tracking control of the nonholonomic wheeled mobile robots have an important problem. This work focus on the application of model-based on Fractional Order  PIaDb (FOPID) controller for trajectory tracking problem. The control algorithm based on the errors in postures of mobile robot which feed to FOPID controller to generate correction signals that transport to  torque for each driven wheel, and by means of dynamics model of mobile robot these torques used to compute the linear and angular speed to reach the desired pose. In this work a dynamics model of

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Face Recognition and Emotion Recognition from Facial Expression Using Deep Learning Neural Network
...Show More Authors
Abstract<p>Face recognition, emotion recognition represent the important bases for the human machine interaction. To recognize the person’s emotion and face, different algorithms are developed and tested. In this paper, an enhancement face and emotion recognition algorithm is implemented based on deep learning neural networks. Universal database and personal image had been used to test the proposed algorithm. Python language programming had been used to implement the proposed algorithm.</p>
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Wireless Propagation Multipaths using Spectral Clustering and Three-Constraint Affinity Matrix Spectral Clustering
...Show More Authors

This study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref