The objective of the present work was to estimate water requirements and water use efficiency for Broccoli under normal irrigation conditions and sewage irrigation. Field experiment was carried out during the season 2018 at station/Sulaimni agricultural station/Bakrajo –College of Agricultural Sciences. The experiment included three treatments: River water irrigation in all season growth (I1), Sewage water irrigation in all season growth (I2), Alternate irrigation (one river irrigation followed by two sewage water irrigation) in all season growth (I3). The experimental Design was Randomized Complete Block Design (RCBD) with three replications. Broccoli planted under surface irrigation system. Mean irrigation requirement for irrigation management scheduling gave water consumptive use values 442, 432 and 427 mm for river water, sewage water and alternate irrigation, respectively. Average yield Broccoli plant was 32.67, 40.25 and 46.73 Ton ha−1 for river water irrigation, sewage water irrigation and alternate irrigation, respectively. High performance of Alternate irrigation application was mentioned by plant height which record 39, 42 and 46 cm; head diameter 21, 25 and 28 cm; leaf area 306, 329 and 349 cm2 and number of leaves 18, 21 and 22 for river water irrigation, sewage water irrigation and alternate irrigation, respectively. WUEc were 7.39, 9.32 and 10.94 kg m−3 for river, sewage and alternate treatments, respectively. The results showed that the concentrations of these elements did not reach the critical limits in the fruits for all irrigation treatments. This is a positive and good result due to the increase in rainfall rates in this season led to weak accumulation of heavy metals in the soil and poor absorption by the plant.
Centric study on the interest of the Directorate General of Training and Development / Ministry of Electricity to consolidate the concept of process and enhancement of knowledge in the areas of organizational change، it reached a sample of the study (44) people who are highly heads of departments، technicians and administrators in different sections of the Directorate and by using the correlation coefficient (Spearman) & coefficient of simple regression been tested correlations between variables and the impact of the study، as has been reached to integrate the role of cognitive processes with the areas of organizational change and relationships that were significant at the level of overall dimensions and subsidiary organs.
... Show MoreThe research aims to release the concept of auditing reporting and its role in the rationalization of economic decisions in the companies listed in the Iraq Stock Exchange from the viewpoint of academics, professionals, investors and lenders. Auditor reporting witnessed the great progress in many areas addressed many of the previous studies compare with Iraqi auditors reporting because there are some defects in these aria .The research problem focused whether the auditor report in Iraq is contains useful information to rationalize investment decisions & lending decisions in the shareholding companies listed on the Iraq Stock Exchange , and under that premise , " There is statistically significant relationship between the reporting au
... Show More
The apricot plant was washed, dried, and powdered after harvesting to produce a fine powder that was used in water treatment. created an alcoholic extract from the apricot plant using ethanol, which was then analysed using GC-MS, Fourier transform infrared spectroscopy, and ultraviolet-visible spectroscopy to identify the active components. Zinc nanoparticles were created using an alcoholic extract. FTIR, UV-Vis, SEM, EDX, and TEM are used to characterize zinc nanoparticles. Using a continuous processing procedure, zinc nanoparticles with apricot extract and powder were employed to clean polluted water. Firstly, 2 g of zinc nanoparticles were used with 20 ml of polluted water, and the results were Tetra 44% and Levo 32%; after
... Show MoreThe Ilkhanid Mongols (651-756 AH / 1253-1355 AD) were interested in urbanization and construction in keeping with civilized countries and to have an architectural imprint that competed with the neighboring nations. The Ilkhan Öljeitü Muḥammad Khudābandeh (703-716 AH / 1303-1316 AD), known for his love of building and construction, wanted to have a capital that would immortalize his name and history, so he ordered its construction to compete with contemporary cities, and he summoned workers and engineers from all over the world to contribute to its construction. The city has several educational and service institutions such as schools, ribats, khanqas, mosques, hospitals, markets, and baths, as well as a mausoleum for him, which
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon the most honorable of creation, Muhammad, whom God sent as a mercy to the worlds, and his pure God and his faithful companions. The Islamic heritage was replete with texts issued from among the pure infallibility, which constituted a prominent teacher that takes the student to stop there in search of its goals, purposes and beauty. The choice was made from those texts that were issued by the imams of Muslims in the Abbasid era, namely Imam Muhammad al-Jawad, his son Imam Ali al-Hadi and his grandson Imam Hassan Zaki al-Askari. (Peace be upon them), and scholars have called them (sons of satisfaction), and researchers have shed light on these texts from rhetorical, artistic
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreIn recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configur
... Show MoreGlobal virtual teams (GVTs) are a recent organizational adaptation created to meet the needs of globalizatized marketplace. GVTs are essentially teams that are distributed across national boundaries and concerned through advanced information and communication technology (ICT) such as email, instant messaging, and video conferencing. The research on GVTs is important in the information system (IS) field because GVTs are dependent on information communication technology and the use of other technologies; GVTs also consists of people from different cultures. This paper tried to answer two research questions. The first one is: what are the GVTs problems facing the project manager (PM). A literature review was conducted to answer the fir
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show More