The field experiment was conducted with the aim of developing and testing an automatic sprayer for agricultural spray experiments and studying the effect of spray pressure, spray speed and spray height on the spraying process. The effects of the major spraying factors (pressure, speed, and height) on the spraying performance of the automatic sprayer were studied. This study included several traits: First - the drop sizes - Second - the penetration of the spray into the vegetation cover - Third, the spray wasted. The results showed: - First: - Increase in coverage percentage when using the first speed, 2 km / h, which amounted to 26.85%. An increment in the spraying penetration of the vegetation cover was observed at the second speed, 4 km/h, reaching 70%. Second - Pressure: The increment in pressure was accompanied by an increment in the coverage trait at the third pressure 3 bar, which amounted to 24.37%. The penetration trait was 81% at pressure of two bar, and wastage increased at the second pressure of two bar, which amounted to 25%. Spraying height: - Height) 40 & 50 cm (have no significant effect on the trait of coverage. However, it was significant in the trait of spraying penetration of the vegetation cover, as it reached at the first height (40 cm) 53% and at the second height (50 cm) 74%, and the trait of the lost at the first height, 40 cm was 13%, and at the second height, 50 cm, it reached 23%. It is concluded from the data, the extent of the effect that the spraying factors show on the studied trait, as The factors value increased is accompanied by an increment in some trait, in contrast to others. So, it becomes clear the necessity of coordinating the values of the factors with each other to obtain an equal spray.
The present research aims to present a theoretical framework for the application of takaful insurance in Iraq, as well as to identify the level of impact on the development of insurance services in the Iraqi market, and to make recommendations and suggestions that lead to increased interest in this area, and thus contribute to the development and integration of insurance service in the Iraqi market,
The research adopted the descriptive analytical method, and the questionnaire was used to survey the opinions of the research sample consisting of department managers and their assistants and some employees of the graduate degrees in addition to employees of the departments of electronic calculator in the Iraqi insurance sector, and t
... Show MoreIt is known that energy subiect has ocuppied a lot of scientests minds about
how to treat the traditional energy and the renewing energy . we know that
most traditional energy coal , oil , Natural gas, neuclear fuel , are limited
guantiy and alsow subjected to be ended .Statics studies refer to reserve
of oil in world will exhausted btween ( 2075- 2100) and alsow cosl too .
While neuclear fuerl which the world seek today through explod the uranium
atom ( 233) the therum atom (239) and neuclear mxied through ruemlear
mixing , These energy have effect on environment and humanity speciaty if
they are used in militery purposes .
For all theses scientests srarch for resources of renewing enery through
researches
In this research, that been focused on the most important economic benefits expected when applying the three standards of sustainability in construction projects (economic, environmental and social). Fuzzy AHP, a multi-decision decision-making technique for evaluating construction projects. Which when used we get the speed and accuracy in the results. Using this technique will reduce uncertainties decisions significantly (fuzzy environment), that found in most projects .The results of the data analysis showed that the economic standards take the greatest relative importance (60%) among the three sustainability standards. Therefore, the implementation of any standards need a cost so the economic benefit of any proje
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreBACKGROUNDS Nasoalveolar molding (NAM) application is among presurgical management (PSM) techniques used for infants with cleft lip and palate (CLP). It helps to approximate the palatal cleft and to reshape the nasoalveolar complex prior to primary lip repair. This study aimed to explore types of PSM and the dental speciality provision for infants with CLP in Baghdad. The status of NAM usage and surgeons’ perceptions toward NAM usage were assessed. MATERIALS AND METHODS This is a cross-sectional paper-based questionnaire study that collected responses of surgeons perform primary lip and nose repair regarding PSM. The questionnaire was distributed amongst public and private hospitals in Baghdad. Twenty surgeons were enrolled (only those su
... Show More
The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.
And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More