Ground-based active optical sensors (GBAOS) have been successfully used in agriculture to predict crop yield potential (YP) early in the season and to improvise N rates for optimal crop yield. However, the models were found weak or inconsistent due to environmental variation especially rainfall. The objectives of the study were to evaluate if GBAOS could predict YP across multiple locations, soil types, cultivation systems, and rainfall differences. This study was carried from 2011 to 2013 on corn (Zea mays L.) in North Dakota, and in 2017 in potatoes in Maine. Six N rates were used on 50 sites in North Dakota and 12 N rates on two sites, one dryland and one irrigated, in Maine. Two active GBAOS used for this study were GreenSeeker and Holland Scientific Crop Circle Sensor ACS 470 (HSCCACS-470) and 430 (HSCCACS-430). Rainfall data, with or without including crop height, improved the YP models in term of reliability and consistency. The polynomial model was relatively better compared to the exponential model. A significant difference in the relationship between sensor reading multiplied by rainfall data and crop yield was observed in terms of soil type, clay and medium textured, and cultivation system, conventional and no-till, respectively, in the North Dakota corn study. The two potato sites in Maine, irrigated and dryland, performed differently in terms of total yield and rainfall data helped to improve sensor YP models. In conclusion, this study strongly advocates the use of rainfall data while using sensor-based N calculator algorithms.
An experiment was conducted in pots under field conditions during fall seasons of 2017 and 2018. This study aimed to improve a weak growth of seedlings under salt stress in sorghum. Three factors were studied. 1st factor was three cultivars (Inqath, Rabeh, and Buhoth70). 2nd factor was seed priming (primed and unprimed seed). Seed were primed by soaking for 12 hours in a solution containing 300 + 70 mg L−1 of gibberellic (GA3) and salicylic (SA) acids, respectively. 3rd factor was irrigation with saline water (6, 9 and 12 dS m−1) resulting from dissolving sodium chloride in distilled water in addition to control treatment (distilled water). Randomized complete block design was used with four replications. In both seasons: the re
... Show MoreAbstract
The current research aims to identify the level of partnership between school and community agencies to improve secondary school outcomes for students with intellectual disabilities and develop strategies that help enhance community partnerships between schools and agencies. The researcher used the qualitative research approach; he utilized the interviews as a tool for data collection. The sample of research included (12) participants: three female school leaders, three male-school leaders, three female-school supervisors, and three male-school supervisors in schools that have programs for students with intellectual disabilities in Riyadh. The results of the study showed that the level of partnership bet
... Show MoreThe study aimed to determine the extent of market knowledge in the companies researched, as if market knowledge is qualified to lead the companies researched to achieve marketing performance , for this purpose, formulated hypotheses of the study in three hypotheses, the first major hypothesis "there is a correlation with significance of market knowledge to improve the marketing performance , "while the second major hypothesis, "there is a significant moral influence of market knowledge to improve the marketing performance " these hypotheses targeting to determine the role played by market knowledge in the leadership of companies researched to achieve improvement in marketing perfor
... Show MoreAccurate predictive tools for VLE calculation are always needed. A new method is introduced for VLE calculation which is very simple to apply with very good results compared with previously used methods. It does not need any physical property except each binary system need tow constants only. Also, this method can be applied to calculate VLE data for any binary system at any polarity or from any group family. But the system binary should not confirm an azeotrope. This new method is expanding in application to cover a range of temperature. This expansion does not need anything except the application of the new proposed form with the system of two constants. This method with its development is applied to 56 binary mixtures with 1120 equili
... Show MoreThe aim of the study is to study the quality of services in a sample of the municipalities of Baghdad governorate and identify the deviations in their operations and provide solutions to address the causes of deviations. The research field aims at the same activity related to municipal services and their quality and analysis using some tools for continuous improvement to identify the authorities responsible for the delay and quality of services. In the future, the importance of research is shown by the use of these tools and their use and their application to the data of the directorates (sample of the study) to diagnose and treat problems, especially that they include statistical methods that are clear and easy to understand the
... Show MoreThe exploitation of all available resources and benefiting from them is one of the most important problems facing the decision makers at the present time. In order to exploit these resources, it is necessary to organize the conflicting objectives, which is the main work in the project management, which enables the development of a plan that decision makers can use to shorten the total completion time and reduce the total cost of the project. Through the use of modern scientific techniques, and therefore the researcher using the critical path method using the technology of programming goals to find more efficient ways to make appropriate decisions where the researcher worked to solve the problems in the construction of the Departm
... Show MoreThe science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show More