Preferred Language
Articles
/
joe-919
Assessment Improving of Rainwater Retention on Crop Yield and Crop Water Use Efficiency for Winter Wheat
...Show More Authors

Storage of rainwater within the root depth zone is one of the modern ways to increase plant production. Subsurface water retention technology was applied to assess improving values of crop yield and crop water use efficiency, applying a membrane made of low-density polyethylene trough installed below the crop root zone. The goal of this paper is to assess that the retention of rainwater above the membrane can improve the crop yield and crop water use efficiency values for winter wheat. The experiment was conducted in open field, within Joeybeh Township, located in east of the Ramadi City, in Anbar Province, in winter growing season 2018-2019. Two plots T1 (with membrane trough) and T2 (without membrane) were used for the comparison and cultivated with winter wheat, where the rainwater was only the source of irrigation. At the end of the harvest stage the obtained results of crop yield and crop water use efficiency for plots T1 and T2 were; 0.35 kg/m2 and 1.66 kg/m3, and 0.28 kg/m2 and 1.28 kg/m3, respectively. The increasing value of crop yield and crop water use efficiency in plot T1 was about 25 % and 30 %, respectively more than plot T2. Benefits of the installation of membrane trough are to keep soil moisture for longer times, prevent the cracks of the soil surface and reduce the deep percolation losses.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey on bio-signal analysis for human-robot interaction
...Show More Authors

<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Sat Jan 19 2019
Journal Name
Artificial Intelligence Review
Survey on supervised machine learning techniques for automatic text classification
...Show More Authors

View Publication
Scopus (324)
Crossref (287)
Scopus Clarivate Crossref
Publication Date
Fri Dec 19 2014
Journal Name
Mutagenesis
Assessment of oxidative damage to DNA, transcriptional expression of key genes, lipid peroxidation and histopathological changes in carp Cyprinus carpio L. following exposure to chronic hypoxic and subsequent recovery in normoxic conditions
...Show More Authors

In fish, a complex set of mechanisms deal with environmental stresses including hypoxia. In order to probe the hypothesis that hypoxia-induced stress could be manifested in varieties of pathways, a model species, mirror carp (Cyprinus carpio), were chronically exposed to hypoxic condition (dissolved oxygen level: 1.80±0.6mg/l) for 21 days and subsequently allowed to recover under normoxic condition (dissolved oxygen level: 8.2±0.5mg/l) for 7 days. At the end of these exposure periods, an integrated approach was applied to evaluate several endpoints at different levels of biological organisation. These included determination of (i) oxidative damage to DNA in erythrocytes (using modified comet assay), (ii) lipid peroxidation in liver sample

... Show More
View Publication
Scopus (58)
Crossref (57)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Sat Jan 31 2009
Journal Name
Not Published
Assessment of the pediatric nurse's knowledge about the nosocomial infection in neonatal intensive care unit of Baghdad pediatric teaching hospitals
...Show More Authors

Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Directly Observed Therapy Short Course (DOTs) Program Therapy in Treatment of Tuberculosis in Al-Sader City 2003-2005
...Show More Authors

Objectives: Assessment outcome of DOTS (Directly observed therapy short course) program in Al-Sader City
Sector that was established by the WHO.
Methodology: Three cohorts groups of patients attending Baghdad TB institute and TB center in Al-Sader city
were followed retrospectively. The 1st cohort included (314) patients registered in year (2003), the 2nd cohort
included (327) patients registered in year (2004), the 3rd cohort included (321) patients registered in year
(2005). The collected data were analyzed for case detection, treatment outcomes, retreatment outcomes,
treatment success, and retreatment success in regard to time, age and sex.
Results: The following rates were extracted for the three cohort: Case det

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Nurses knowledge toward prevention of Complications related Valvular Replacement Surgery at Surgical Department in AL-Nasiriyah Heart Center
...Show More Authors

Objectives: The study aims to assess  the nurses knowledge toward prevention of complications related to valvular  replacement surgery and to find out the relationship between nurses knowledge and their demographic and occupational characteristic's Which as (Age, gender, level of education ,years of experience in Surgical Department , and training sessions)

 

Methodology: A descriptive design  (a cross-sectional study ) was carried out from December 2017 to May 2018 in order to assess nurses' knowledge of preventing complications Valvular Replacement Surgery at Surgical Department in  Nasiriyah Heart Center on a purposive (non-probability) sample

... Show More
View Publication Preview PDF