Preferred Language
Articles
/
joe-770
Numerical Simulation of Unsaturated Soil Water from a Trickle Irrigation System for Sandy Loam Soils
...Show More Authors

Trickle irrigation is a system for supplying filtered water and fertilizer directly into the soil and water and it is allowed to dissipate under low pressure in an exact predetermined pattern. An equation to estimate the wetted area of unsaturated soil with water uptake by roots is simulated numerically using the HYDRUS-2D/3D software. In this paper, two soil types, which were different in saturated hydraulic conductivity were used with two types of crops tomato and corn, different values of emitter discharge and initial volumetric soil moisture content were assumed. It was assumed that the water uptake by roots was presented as a continuous sink function and it was introduced into Richard's equation in the unsaturated zone. Equations for wetted depth and radius were predicted. A good agreement was found between the predicted results with those obtained from the experiment field work. The maximum error of the predicted results were 23%, and 0.98 for modeling efficiency (EF), moreover, the root square error (RMSE) was below 0.95 cm.   

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
International Conference On Scientific Research & Innovation (icsri 2022)
Saccharomyces Cerevisiae as a human pathogen in renal transplant recipients
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of The College Of Education For Women
The Middle East and Contemporary Geostrategic Shifts: A Geopolitical Study
...Show More Authors

This research focuses on the contemporary geostrategic transformations that afflicted the countries of the Middle East, with a focus on the countries of the Arab East, after the collapse of the system of international relations, and the emergence of the unipolar system led by the United States of America. After the events of September 11 and the events that followed, especially the occupation of Iraq in 2003, the study area witnessed a group of geopolitical variables and the emergence of dangerous phenomena that threatened the state structure in the countries of the Middle East; the most notably are the phenomenon of terrorism, cross-border armed groups, sectarian polarization, the phenomenon of migration and the internal and the externa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 26 2025
Journal Name
Biobacta Journal Of Biochemistry And Molecular Biology
How Pantoea can help solve modern agriculture problems: A Review
...Show More Authors

Modern agriculture is challenged by soil degradation, nutrient depletion, plant diseases, and excessive dependence on chemical fertilizers and pesticides. By examining different strains of Pantoea, the study highlights their role in promoting plant growth, improving their tolerance to stress, reducing reliance on synthetic agricultural inputs, and contributing to more sustainable and environmentally friendly agricultural practices. Using a combination of practical qualitative methods and reliable quantitative data, the research gathers extensive information on how these microbes impact various crops and key soil health indicators. The improvements in plant growth statistics and nutrient levels are often quite astonishing. The result

... Show More
View Publication
Crossref
Publication Date
Thu Aug 25 2022
Journal Name
Ira International Journal Of Education And Multidisciplinary Studies
Gender and Olds’ Advice in Written Signs: A Pragmatic Study
...Show More Authors

Giving advice refers to an attempt by the speaker to express what the addressee should do in a particular situation or what is good for him/her. It is also a feature of making social relations and communications move smoothly and become stronger. The current study aims to investigate the strategies of the speech act of advice by old females and males for the younger generation in written signs. Comparison is made between old females and males regarding their pragmatic use of advice and the way they are manifested in expressing gender identity differences. The sample of the study consists of (30) written signs of advice divided equally between the two gender groups. Hinkel’s (1997) classification of the strategies for perceiving th

... Show More
View Publication
Crossref
Publication Date
Fri Mar 21 2025
Journal Name
Iklil For Human Studies
Review Article A Feminist Gothic in the American Literary Fiction
...Show More Authors

Teresa Fitzpatrick presents a connection between oppressed women and the plant of Wisteria in gothic fiction in her article “Wisteria: A Female Eco-Gothic Metaphor in American Fiction Through the Ages.” The connection between women and nature is common in literature as women are usually compared to the beauty or ferocity of flowers, rivers, or natural phenomena in general. The connection extends to the architecture and sort of plants that appear in gothic literature. Gothic novels have routinely been connected to the secrets and life stories of women who cannot have the liberty to live or share them outside their homes. A fearful house with a prisoned person, ghost, or a secret is mostly normally found in gothic writing. Women have exce

... Show More
Preview PDF
Publication Date
Fri Dec 30 2016
Journal Name
Al-kindy College Medical Journal
Congenital Thrombasthenia In Children Welfare Teaching Hospital: A Descriptive Study
...Show More Authors

Background: Thrombasthenia is an inherited genetic disorder affecting platelets, which is characterized by spontaneous muco-cutaneous bleeding and abnormally prolonged bleeding in response to injury or trauma. Objectives: The aim of this study was to assess the diagnosis and treatment of thrombasthenia in Children Welfare Teaching Hospital. Type of the study: A cross-sectional study. Methods: This descriptive study was performed on 66 patients with thrombasthenia from the first of October 2013 till the first of July 2015.The diagnosis of the disease was done by a wide spectrum of characteristics including family history, clinical manifestations, laboratory tests.. Results: The common manifestations of the disease at time of diagnosis wer

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Rawal Medical Journal
Procalcitonin Level In COVID-19 Patients: A single center study
...Show More Authors

Objective: The study the association of procalcitonin (PCT) and c-reactive protein (CRP) levels in COVID-19 patients and it's role as a guide in progress and management of those patients. Methodology: This cross-sectional study analyzed 200 CIOVID-19 patients in a single privet center in Baghdad, Iraq from January 1, 2021 to January 1, 2022. Demographic data like age, sex, and clinical symptoms were recorded. High sensitivity CRP and PCT in the serum were measured via dry fluorescence immunoassay (Lansionbio-China). Results: Out of 200 patients, 50 had moderate Covid and 150 had severe disease. Mean serum PCT levels was 0.039±0.05 ng/mL in the moderate group (range 0.011-0.067) and 0.43±0.21 ng/mL in the severe group (range 0.21

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Lichen planopilaris is a common scarring alopecia among Iraqi population
...Show More Authors

KE Sharquie, AA Noaimi, AF Hameed, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 11

View Publication
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Using Machine Learning to Control Congestion in SDN: A Review
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref