Wearable sensors are a revolutionary tool in agriculture because they collect accurate data on plant environmental conditions that affect plant growth in real-time. Moreover, this technology is crucial in increasing agricultural sustainability and productivity by improving irrigation strategies and water resource management. This review examines the role of wearable sensors in measuring plant water content, leaf and air humidity, stem flow, plant and air temperature, light, and soil moisture sensors. Wearable sensors are designed to monitor various plant physiological parameters in real-time. These data, obtained through wearable sensors, provide information on plant water use and physiology, making our agricultural choices more informed and accurate. Internet of Things (IoT) technologies can improve irrigation strategies and reduce water consumption by analyzing data from wearable sensors and adapting it to automate the irrigation system. The review also highlights the importance of using Artificial Intelligence (AI) to predict plant water needs accurately. This review concludes that wearable sensors provide accurate and real-time data on the stress state of plants and their surroundings, improving water management efficiency and agricultural production sustainability. These IOT and AI-enabled technologies are a crucial milestone toward smart and sustainable agriculture, which shows the importance of innovation in responding to enhanced climate threats.
The current research aims to know the complementary use of the paper book and the digital book by defining the paper book and the digital book and knowing the methods and methods of obtaining each of them and indicating the extent of their use and for what purpose and knowing the difficulties that researchers face in using each of them and which is better using the paper book or the digital book in preparing research Studies and for no reason. The research relied on the descriptive approach and the questionnaire as a tool for data collection, and it was distributed to professors and students of Iraqi universities. The research sample reached (219) individuals and reached a set of results, the most important of which are: Preference for the
... Show MoreSolid state blue laser source is a solid state laser include generation of IR laser light 1064 nm and companied with other wavelength 810 nm that invented from other active medium (Tm:ZBLAN) and non-linear crystal (CLBO) are used to generate fourth harmonic of the resultant wavelength 1874 nm that is blue laser light of 460nm. Several optical component have been designed by multilayer dielectric structure and anti reflection coating analysis. By using MATLAB soft ware, the simulation done and used the following non linear material (ZrO2, HfO2, MgO, SiO, Ta2O5 CaF2) and other linear material (ZnO, MgF2, GaAs, AlAs, BaF2, LiF, TiO2) as coating material. The result showed that as more quarter wave layers are added to the structure, the refl
... Show MoreTurkey Consider Tigris and Euphrates rivers as a national rivers, and not an a International rivers, so that . It insists on its absolute sovereignty on that resources. The block ( levee ) which Turkey established should not create International problems.
The All International agreements and laws in this sect warrant the rights of all the states that located in river stream to use it without any consider to the regional absolute right.
During the 1980s, Turkey construct water projects, started with GAP, project which is one of the greatest project in the world, in spite of the plane of construct of the keep an levee on the Euphrates was pre of that project. The
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreABSTRUCT
In This Paper, some semi- parametric spatial models were estimated, these models are, the semi – parametric spatial error model (SPSEM), which suffer from the problem of spatial errors dependence, and the semi – parametric spatial auto regressive model (SPSAR). Where the method of maximum likelihood was used in estimating the parameter of spatial error ( λ ) in the model (SPSEM), estimated the parameter of spatial dependence ( ρ ) in the model ( SPSAR ), and using the non-parametric method in estimating the smoothing function m(x) for these two models, these non-parametric methods are; the local linear estimator (LLE) which require finding the smoo
... Show MoreThis paper presents a grey model GM(1,1) of the first rank and a variable one and is the basis of the grey system theory , This research dealt properties of grey model and a set of methods to estimate parameters of the grey model GM(1,1) is the least square Method (LS) , weighted least square method (WLS), total least square method (TLS) and gradient descent method (DS). These methods were compared based on two types of standards: Mean square error (MSE), mean absolute percentage error (MAPE), and after comparison using simulation the best method was applied to real data represented by the rate of consumption of the two types of oils a Heavy fuel (HFO) and diesel fuel (D.O) and has been applied several tests to
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More