Storage of rainwater within the root depth zone is one of the modern ways to increase plant production. Subsurface water retention technology was applied to assess improving values of crop yield and crop water use efficiency, applying a membrane made of low-density polyethylene trough installed below the crop root zone. The goal of this paper is to assess that the retention of rainwater above the membrane can improve the crop yield and crop water use efficiency values for winter wheat. The experiment was conducted in open field, within Joeybeh Township, located in east of the Ramadi City, in Anbar Province, in winter growing season 2018-2019. Two plots T1 (with membrane trough) and T2 (without membrane) were used for the comparison and cultivated with winter wheat, where the rainwater was only the source of irrigation. At the end of the harvest stage the obtained results of crop yield and crop water use efficiency for plots T1 and T2 were; 0.35 kg/m2 and 1.66 kg/m3, and 0.28 kg/m2 and 1.28 kg/m3, respectively. The increasing value of crop yield and crop water use efficiency in plot T1 was about 25 % and 30 %, respectively more than plot T2. Benefits of the installation of membrane trough are to keep soil moisture for longer times, prevent the cracks of the soil surface and reduce the deep percolation losses.
The growing water demand has raised serious concerns about the future of irrigated agriculture in many parts all over the world, changing environmental conditions and shortage of water (especially in Iraq) have led to the need for a new system that efficiently manages the irrigation of crops. With the increasing population growing at a rapid pace, traditional agriculture will have a tough time meeting future food demands. Water availability and conservation are major concerns for farmers. The configuration of the smart irrigation system was designed based on data specific to the parameters concerning the characteristics of the plant and the properties of soil which are measured once i
Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreDecision-makers in each country work to define a list of internal and external interests, goals and threats to their countries according to the nature of their awareness of these interests, goals and threats.
Hence, Iraq is not an exception to this rule, and the process of evaluating its interests and the objectives of its foreign policy is subject to the pattern of awareness of decision-makers and the influencing forces in defining its basic interests, which often witness some kind of difference in defining them, evaluating their importance and determining the size of the threats they face. And among these interests and threats that have witnessed a difference in the assessment of their
... Show MorePublications are generally considered an effective visual artistic means that addresses the recipient (the audience), with the functional, aesthetic and expressive dimensions they carry that contribute to spreading a diverse cultural awareness, especially those publications that are concerned with their media, promotional and organizational performance, as well as specific cultural events at specific times, in pursuit Access to renewable and elaborate designs to achieve the functional and aesthetic purpose, as the completed design and construction process is subject to many variations, whether this diversity is intellectual or technical, internal or external, and all of them may overlap to obtain a comprehensive system of artistic format
... Show MoreIn this paper we study the selection of cognitive elements and criteria of the inflectional structure of the Russian and Arabic languages in the process of speech communication. Phonetic-physiological principle is the main parameter by which the elements and criteria of cognitive activity in the presented study are distinguished. On the basis of the above mentioned parameter, we select the investigated criteria and elements. The first criterion is semantic, reflects the accordance of the elements of thinking to sound combinations in the studied languages, and allows us to distinguish the second criterion – morphonological. The second criterion depends on the phonetic changes of these combinations occurring in the process of speech activit
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreIn the beta decay process, a neutron converts into a proton, or vice versa, so the atom in this process changes to a more stable isobar. Bethe-Weizsäcker used a quasi-experimental formula in the present study to find the most stable isobar for isobaric groups of mass nuclides (A=165-175). In a group of isobars, there are two methods of calculating the most stable isobar. The most stable isobar represents the lowest parabola value by calculating the binding energy value (B.E) for each nuclide in this family, and then drawing these binding energy values as a function of the atomic number (Z) in order to obtain the mass parabolas, the second method is by calculating the atomic number value of the most stable isobar (ZA). The results show
... Show MoreA modification to cascaded single-stage distributed amplifier (CSSDA) design by using active inductor is proposed. This modification is shown to render the amplifier suitable for high gain operation in small on-chip area. Microwave office program simulation of the Novel design approach shows that it has performance compatible with the conventional distributed amplifiers but with smaller area. The CSSDA is suitable for optical and satellite communication systems.