Many of the Iraqi agricultural researches are used spraying technique to add chemical products including pesticides and growth regulators. Various studies were performed to study the effect of these substances at different concentrations to improve plant production. In order to adopt specific criteria of spraying researches and to replicate them easily, it is a necessary to mention all information related to the spraying processes and regulations for improving sprayer’s performance by increasing the amount of pesticide deposited on the target. The current study aims to survey Iraqi researches in details and analyse them randomly. Also, to highlight on the importance of information applied in spraying techniques and its relationship with improving of agricultural production. The survey showed most of these researches does not mention sufficiently the basic information, especially in the spraying or calibrating processes. These processes are important to ensure the best distribution of spraying in the field depending on type of sprayer, nozzle type, and operating pressure. Also, some of these researches do not show the application rate of pesticide and the factors affected on it, which may lead to imbalance in homogenization of the pesticide distribution. This study recommended using a power sprayer to avoid the misapplication in droplets distribution in comparison with packback sprayers, which have a complication in the operating pressure and nozzle height regulation. Another recommendation was a necessity to select the perfect nozzle type that agrees with the global publications.
Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreABSTRACT: BACKGROUND: Estrogens has traditionally been known as the female hormone, but this idea has been challenged in early 1990’s and an essential physiological role for estrogen in male fertility was identified. Phytoestrogens are naturally occurring non-steroidal plant chemicals that can act like the female hormone estrogen. The herbs ( anise alfalfa and vervain ) chosen in this study contain phytoestrogens. OBJECTIVE: Previous studies demonstrated controversy of the effects of phytoestrogens on the rat testes .Hence, the present investigation was undertaken to investigate the influence of typical dose of herbs containing phytoestrogen on the rat testis. MATERIALS AND METHODS: Twenty-four apparently normal mature male rats we
... Show MoreAn experimental model is used to simulate the loss of soil lateral confinement due to excavation nearby an individual axially loaded pile. The effects of various parameters, such as the horizontal distance of excavation, depth of excavation and pile slenderness ratios are investigated. The experimental analysis results showed the effect of excavation is more remarkable as the horizontal distance of excavation becomes closer to the pile than half pile length. The effect of excavation diminishes gradually as the horizontal distance increases beyond that distance for all the investigated pile slenderness ratios and depths of excavation. The pile head deflection, settlement and bending moments along pile increase with decreasing horizontal d
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThe adsorption of Malonic acid, Succinic acid, Adipic acid, and Azelaic acid from their aqueous solutions on zinc oxide surface were investigated. The adsorption efficiency was investigated using various factors such as adsorbent amount, contact time, initial concentration, and temperature. Optimum conditions for acids removal from its aqueous solutions were found to be adsorbent dose (0.2 g), equilibrium contact time (40 minutes), initial acids concentration (0.005 M). Variation of temperature as a function of adsorption efficiency showed that increasing the temperature would result in decreasing the adsorption ability. Kinetic modeling by applying the pseudo-second order model can provide a better fit of the data with a greater correla
... Show MorePurpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show More