Preferred Language
Articles
/
joe-616
Improving Water Use Efficiency and Water Productivity for Okra Crop by using Subsurface Water Retention Technology
...Show More Authors

Utilizing the modern technologies in agriculture such as subsurface water retention techniques were developed to improve water storage capacities in the root zone depth. Moreover, this technique was maximizing the reduction in irrigation losses and increasing the water use efficiency. In this paper, a polyethylene membrane was installed within the root zone of okra crop through the spring growing season 2017 inside the greenhouse to improve water use efficiency and water productivity of okra crop. The research work was conducted in the field located in the north of Babylon Governorate in Sadat Al Hindiya Township seventy-eight kilometers from Baghdad city. Three treatments plots were used for the comparison using surface trickle irrigation system: Polyethylene sheet (SWRT) was used in plot T1, controlled irrigation in plot T2 and uncontrolled irrigation in plot T3. Irrigation quantities, time of irrigation, soil water contents were measured for all treatments plots. The results indicated that water use efficiency for the three experimental plots, T1, T2, and T3 were: 2.43, 1.94 and 0.98 kg/m3, respectively.  The increasing value in water use efficiency of T1 plot compared with T2 and T3 plots were 25 and 148 %, respectively. Additionally, the water productivity of okra crop for T1, T2, and T3 plots was: 12800.9, 8744.8, and 4736.3 ID/m3, respectively. The increasing value of the water productivity of T1 compared with plots T2 and T3 was 46 and 170 %, respectively. From this study, the benefit of using membrane sheet below the soil surface resulted in an increase in the value of yield, water use efficiency and water productivity. Moreover, saving water and reduced the water losses by deep percolation were resulted.   

  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 29 2018
Journal Name
International Journal Of Women's Health And Reproduction Sciences
Prediction of Placenta Accreta Using Hyperglycosylated Human Chorionic Gonadotropin
...Show More Authors

Objectives: Hyperglycosylated human chorionic gonadotropin (hCG) is a variant of hCG. In addition, it has a different oligosaccharide structure compared to the regular hCG and promotes the invasion and differentiation of peripheral cytotrophoblast. This study aimed to measure hyperglycosylated hCG as a predictor in the diagnosis of placenta accreta. Materials and Methods: In general, 90 pregnant women were involved in this case-control study among which, 30 ladies (control group) were pregnant within the gestational age of ≥36 weeks with at least one previous caesarean section and a normal sited placenta in transabdominal ultrasound (TAU). The other 60 pregnant women (case

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Nov 25 2015
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Subject Independent Facial Emotion Classification Using Geometric Based Features
...Show More Authors

Accurate emotion categorization is an important and challenging task in computer vision and image processing fields. Facial emotion recognition system implies three important stages: Prep-processing and face area allocation, feature extraction and classification. In this study a new system based on geometric features (distances and angles) set derived from the basic facial components such as eyes, eyebrows and mouth using analytical geometry calculations. For classification stage feed forward neural network classifier is used. For evaluation purpose the Standard database "JAFFE" have been used as test material; it holds face samples for seven basic emotions. The results of conducted tests indicate that the use of suggested distances, angles

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Ibuprofen Degradation from Synthetic Wastewater Using Photo-Fenton Process
...Show More Authors

   The removal of Ibuprofen antibiotics (IBU) by photo-degradation UV/H2O2/Fe+2 system was investigated in a batch reactor under different initial concentrations of H2O2 (100-500) mg/L, Fe+2 (10-40) mg/L, pH (3-9) and initial concentrations of IBU (10-80) mg/L, and their relationship with the degradation efficiency were studied. The result demonstrated that the maximum elimination of IBU was 85.54% achieved at 300 mg/L of H2O2, 30 mg/L of Fe+2, pH=3, and irradiation time of 150 min, for 10 mg/L of IBU. The results have shown that the oxidation reagent H2O2 plays a very important role in IBU degradation.

View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
International Journal Of Advanced Research
Attenuation Coefficient of Reactive Powder Concrete Using Different Energies.
...Show More Authors

Linear and mass attenuation coefficient of reactive powder concrete (RPC) sample ( of compressive strength equal to 70 Mpa) using beta particles and gamma ray with different energies have been calculated as a function of the absorber thickness and energy. The attenuation coefficient were obtained using NaI(Tl) energy selective scintillation counter with 90Sr/90Y beta source having an energy rang from (0.546-2.274) MeV and gamma ray energies (0.569, 0.662, 1.063, 1.17 and 1.33) MeV . The attenuation coefficient usually depends upon the energy of radiations and nature of the material. The result represented in graphical forms. Exponential decay was observed. It is found that the capability of reactive powder concrete to absorber beta particle

... Show More
Publication Date
Sat Dec 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Indirect Electrochemical Oxidation of Phenol Using Rotating Cylinder Reactor
...Show More Authors

Indirect electrochemical oxidation of phenol and its derivatives was investigated by using MnO2 rotating cylinder electrode. Taguchi experimental design method was employed to find the best conditions for the removal efficiency of phenol and its derivatives generated during the process. Two main parameters were investigated, current density (C.D.) and electrolysis time. The removal efficiency was considered as a response for the phenol and other organics removal. An orthogonal array L16, the signal to noise (S/N) ratio, and the analysis of variance were used to test the effect of designated process factors and their levels on the performance of phenol and other organics removal efficiency. The results showed that th

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Studying Hueckel edge detector using binary step edge image
...Show More Authors

Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF