Preferred Language
Articles
/
zBYYsIsBVTCNdQwCB9YL
Determine, Predict and Map Soil pH Level by Fiber Optic Sensor
...Show More Authors
Abstract<p>Soil pH is one of the main factors to consider before undertaking any agricultural operation. Methods for measuring soil pH vary, but all traditional methods require time, effort, and expertise. This study aimed to determine, predict, and map the spatial distribution of soil pH based on data taken from 50 sites using the Kriging geostatistical tool in ArcGIS as a first step. In the second step, the Support Vector Machines (SVM) machine learning algorithm was used to predict the soil pH based on the CIE-L*a*b values taken from the optical fiber sensor. The standard deviation of the soil pH values was 0.42, which indicates a more reliable measurement and the data distribution is normal. The Kriging method gave a prediction accuracy of 65% while the SVM algorithm gave an accuracy of 80%. The root mean square error (RMSE) was 0.36, 0.16 and the mean absolute error (MAE) was 0.37, 0.13, respectively, for the two methods. These two methods allow the prediction of soil pH and thus the assessment of soils, allowing for easier and more efficient management decisions and sustaining productivity.</p>
Scopus Crossref
View Publication
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Numerical Analysis of Fluid Flow and Heat Transfer by Forced Convection in Channel with one-sided Semicircular Sections and Filled with Porous Media
...Show More Authors

This research presents a numerical study to simulate the heat transfer by forced convection as a result of fluid flow inside channel’s with one-sided semicircular sections and fully filled with porous media. The study assumes that the fluid were Laminar , Steady , Incompressible and inlet Temperature was less than Isotherm temperature of a Semicircular sections .Finite difference techniques were used to present the governing equations (Momentum, Energy and Continuity). Elliptical Grid is Generated using Poisson’s equations . The Algebraic equations were solved numerically by using (LSOR (.This research studied the effect of changing the channel shapes on fluid flow and heat transfer  in two cases ,the first: cha

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of Cysts and Cystic-Like Lesions of the Jaws and Their Effect on Adjacent Structures by Using Cone Beam Computed Tomography (CBCT)
...Show More Authors

Background: Preoperative radiographical assessment of the maxillofacial lesions is of a great importance in guiding the surgeon during surgical procedure in reducing post-operative complications. This study highlighted the application of CBCT scan in the assessment of maxillofacial cystic and cystic like lesions as a part of advanced radiology Materials and methods: A total of 20 patients (15 males and 5 females) participated in this prospective study. CBCT scan (Kodak 9500 CBCT) with (DICOM) software utilized to perform scanning to all patients in order to assess lesion extension, morphological features and it’s relation to the adjacent vital structures. Results: In this study, the total cystic and cystic like lesions involving the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Population Density and Susceptibility of Some Varieties of Potato to Infested by Aphid and Thrips on Spring Plantation in the Middle of Iraq
...Show More Authors

Aphid Aphis spp (Hemiptera:Aphididae) and Thrips Thrips spp (Thysanoptera: Thripidae) an economically important pests on several crops in the world and Iraq, that transfer many viruses diseases to it. Field studies were conducted to assessment the population density of these insects and susceptibility of six varieties (Barin, Revera, Divela, Rudlph, Alazata and Pleny) to infestation during 2013 spring season. The results were showed that all Potato varieties were infested by Aphis and Thrips on spring plantation but with different percentage. The Divela variety was higher percentage of infestation and high population density of aphid which averaged 1.47 insect/ leaf while in Alazata was the lower population density which averaged 1.02 in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Engineering
Comparative Biosorption Of Pb(II), Cr(III) AND Cd(II) Ions In Single Component System By Live And Dead Anaerobic Biomass, Bath Study
...Show More Authors

In this study, dead and live anaerobic biomass was used in biosorption of Pb(II), Cr(III) and Cd(II) ions from a synthetic wastewater. The biosorption was investigated by batch adsorption experiments. It was found that, the biosorption capacities were significantly affected by biosorbent dosage. The process follows Langmuir isotherm (regression coefficient 0.995, 0.99 and 0.987 for Pb(II), Cr(III) and Cd(II) ions, respectively, onto dead anaerobic biomass) model with uniform distribution over the biomass surface. The experimental uptake capacity was 51.56, 29.2 and 28 mg/g for Pb(II), Cr(III) and Cd(II), respectively, onto dead anaerobic biomass, compared with 35, 13.6 and 11.8 mg/g for Pb(II), Cr(III) and Cd(II), respectively, onto live

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Jun 10 2024
Journal Name
Iraqi Journal For Computer Science And Mathematics
Solving tri-criteria: total completion time, total late work, and maximum earliness by using exact, and heuristic methods on single machine scheduling problem
...Show More Authors

The presented study investigated the scheduling regarding  jobs on a single machine. Each  job will be processed with no interruptions and becomes available for the processing at time 0. The aim is finding a processing order with regard to jobs, minimizing total completion time , total late work , and maximal tardiness  which is an NP-hard problem. In the theoretical part of the present work, the mathematical formula for the examined problem will be presented, and a sub-problem of the original problem of minimizing the multi-objective functions  is introduced. Also, then the importance regarding the dominance rule (DR) that could be applied to the problem to improve good solutions will be shown. While in the practical part, two

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
Textual thresholds and its Aesthetic in history: "Mamo Zain" by its author, the famous Kurdish poet Sheikh Ahmad Al-Khani, deceased (1118 AH / 707 AD), translated by Sheikh Dr. Muhammad Saeed Ramadan al-Bouti. Research on the connotation and manifestations of interconnection
...Show More Authors

Literary works include, for the most part, text thresholds, which are the first entry into reading them and understanding their connotations, and (literary works) vary according to text thresholds, some of which are limited to the title and on the cover page only, and others, in addition to these two thresholds, are based on the dedication threshold too, and others ...

This study takes the story of "Mamo Zain" of the poet Ahmed Al-Khani and his translator Sheikh Muhammad Ramadan Al-Bouti as the field of study, as it is a unique literary work, which included a number of textual thresholds which supported each other and cooperated with the content of the work.

The threshold of dedication in the story of "Mamo Zain" was a spee

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 09 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ESTIMATION OF WATER POLLUTION AND CULTIVATED PLANTS ON THE DIYALA RIVER WITH HEAVY ELEMENTS DURING THE SUMMER BY FLAME ATOMIC ABSORPTION: ESTIMATION OF WATER POLLUTION AND CULTIVATED PLANTS ON THE DIYALA RIVER WITH HEAVY ELEMENTS DURING THE SUMMER BY FLAME ATOMIC ABSORPTION
...Show More Authors

This study was carried out to measure the percentage of heavy metals pollution in the water of the Diyala river and to measure the percentage of contamination of these elements in the leafy vegetables grown on both sides of the Diyala river, which are irrigated by the contaminated river water (celery, radish, lepidium, green onions, beta vulgaris subsp, and malva). Laboratory analysis was achieved to measure the ratio of heavy element contamination (Pb, Fe, Ni, Cd, Zn and Cr) using flame atomic absorption spectrophotometer during the summer months of July and August for the year 2017. The study showed that the elements of zinc, chromium, nickel and cadmium were high concentrations and exceeded. The maximum concentration of these

... Show More
View Publication Preview PDF
Publication Date
Wed May 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Corrosion control of Buried Low Carbon Steel Structure by Using Alteration Medias method
...Show More Authors


Abstract

The aim of the present work is to control of metal buried corrosion by alteration the media method. This method depended on the characteristics of each media. The corrosion rates in different media (soil, sand, porcelanite stone and gravel) for specimens of low carbon steel were measured by two methods weight loss method and polarization method, weight loss measured by buried specimens in these medias separately for 90 days. The polarization method includes preparing of specimen and salt solutions have electrical resistivity equivalent electrical resistivity of these media. The corrosion rate of two method results in (soil > sand> porcelainte stone> gravel). The lower corrosion rate happene

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF