Storage of rainwater within the root depth zone is one of the modern ways to increase plant production. Subsurface water retention technology was applied to assess improving values of crop yield and crop water use efficiency, applying a membrane made of low-density polyethylene trough installed below the crop root zone. The goal of this paper is to assess that the retention of rainwater above the membrane can improve the crop yield and crop water use efficiency values for winter wheat. The experiment was conducted in open field, within Joeybeh Township, located in east of the Ramadi City, in Anbar Province, in winter growing season 2018-2019. Two plots T1 (with membrane trough) and T2 (without membrane) were used for the comparison and cultivated with winter wheat, where the rainwater was only the source of irrigation. At the end of the harvest stage the obtained results of crop yield and crop water use efficiency for plots T1 and T2 were; 0.35 kg/m2 and 1.66 kg/m3, and 0.28 kg/m2 and 1.28 kg/m3, respectively. The increasing value of crop yield and crop water use efficiency in plot T1 was about 25 % and 30 %, respectively more than plot T2. Benefits of the installation of membrane trough are to keep soil moisture for longer times, prevent the cracks of the soil surface and reduce the deep percolation losses.
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreThis research included the study of different factors that may effect on gatifloxacin stability (anew quinolone synthetic antibacterial agent) in its aqueous solution in order to develop and optimize the best delivary of the drug to the eye (as eye drop) with maximum local concentration and minimum systemic absorption and toxicity.Different formulas of gatifloxacin solution for ophthalmic use (0.3%)w/v were prepared in citrate, acetate,citrate/phosphate and phosphate buffers,their tonicity adjusted with suitable quantity of sodium chloride.The effect of different factors that might affectthe stability of gatifloxacin in its prepared ophthalmic solution was studied and determined spectrophotometrically at 287 nm. The results showed t
... Show MoreAbstract
The model of financial reporting in Iraq Based on a specific set of accounting objectives & concepts, which require the application of the historical cost valuation approach due to the nature of the objectives of financial reporting in Iraq, established under the unified accounting system , which focuses on serving the needs of the state because it the most influential user in setting accounting objectives and concepts, which stems mainly from the nature of the economic system in Iraq, which focuses on the public sector versus the private sector as well as the nature of the ownership business that focuses on partnership versus corpor
... Show MoreThe image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o
... Show MorePassword authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.
The main purpose of this paper is to define generalized Γ-n-derivation, study and investigate some results of generalized Γ-n-derivation on prime Γ-near-ring G and
Let M is a Г-ring. In this paper the concept of orthogonal symmetric higher bi-derivations on semiprime Г-ring is presented and studied and the relations of two symmetric higher bi-derivations on Г-ring are introduced.