Applications of remote sensing are important in improving potato production through the broader adoption of precision agriculture. This technology could be useful in decreasing the potential contamination of soil and water due to the over-fertilization of agriculture crops. The objective of this study was to assess the utility of active sensors (Crop Circle™, Holland Scientific, Inc., Lincoln, NE, USA and GreenSeeker™, Trimble Navigation Limited, Sunnyvale, CA, USA) and passive sensors (multispectral imaging with Unmanned Arial Vehicles (UAVs)) to predict total potato yield and phosphorus (P) uptake. The experimental design was a randomized complete block with four replications and six P treatments, ranging from 0 to 280 kg P ha−1, as triple superphosphate (46% P2O5). Vegetation indices (VIs) and plant pigment levels were calculated at various time points during the potato growth cycle, correlated with total potato yields and P uptake by the stepwise fitting of multiple linear regression models. Data generated by Crop Circle™ and GreenSeeker™ had a low predictive value of potato yields, especially early in the season. Crop Circle™ performed better than GreenSeeker™ in predicting plant P uptake. In contrast, the passive sensor data provided good estimates of total yields early in the season but had a poor correlation with P uptake. The combined use of active and passive sensors presents an opportunity for better P management in potatoes.
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
In this paper we present the first ever measured experimental electron momentum density of Cu2Sb at an intermediate resolution (0.6 a.u.) using 59.54 keV 241Am Compton spectrometer. The measurements are compared with the theoretical Compton profiles using density function theory (DFT) within a linear combination of an atomic orbitals (LCAO) method. In DFT calculation, Perdew-Burke-Ernzerhof (PBE) scheme is employed to treat correlation whereas exchange is included by following the Becke scheme. It is seen that various approximations within LCAO-DFT show relatively better agreement with the experimental Compton data. Ionic model calculations for a number of configurations (Cu+x/2)2(Sb-x) (0.0≤x≤2.0) are also performed utilizing free a
... Show MoreThe agriculture around the world faced many difficulties and the important was to reduce inputs of chemical fertilizers and pesticides and increase the total yield specially with the continuous grow of populations numbers at the world expected to reach more than 9 billion by 2050. In other hand there are other problems which make the challenges bigger such as wars, biotic and abiotic stress, and diseases. The scientists tried to find solutions by using Nano-fertilization which consider a modern way to quickly grow up the yield and decrease use the chemicals. The use of nanotechnology may be destructive on human and the environment due to fast accumulation in the tissues of alive bodie
The speech recognition system has been widely used by many researchers using different
methods to fulfill a fast and accurate system. Speech signal recognition is a typical
classification problem, which generally includes two main parts: feature extraction and
classification. In this paper, a new approach to achieve speech recognition task is proposed by
using transformation techniques for feature extraction methods; namely, slantlet transform
(SLT), discrete wavelet transforms (DWT) type Daubechies Db1 and Db4. Furthermore, a
modified artificial neural network (ANN) with dynamic time warping (DTW) algorithm is
developed to train a speech recognition system to be used for classification and recognition
purposes. T
Gypseous soils represented one of the most complex salty soils that faced the geotechnical engineers. Structures that built on gypsum soil will undergo unexpected distortions that will eventually contribute to catastrophic failure. The purpose of this article is to understand the durability of gypsum soil against wetting drying cycles after improvement with polyurethane polymer especially investigate the effect of the wetting-drying cycle on collapsibility. The soil was brought from Sawa lake in AL-Muthanna Governorate in Iraq, with gypsum content 65.5%, A set of Odometer tests were performed to determine the collapsibility potential (CP) for treated and untreated gypsum soil. The result shows that adding a different per
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreIn this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show More