Preferred Language
Articles
/
kBd9a5ABVTCNdQwCHInP
Calculating some Powers and Traction Force for Two Plows in Primary Tillage
...Show More Authors

Traction force and power requirement when performing primary tillage occupy the minds of almost farmers, this field research had aim to determine and calculate the pulling force of the most commonly used moldboard and chisel plows, the research conducted in silt clay loam for chisel and moldboard plows as the main factor, two depths of tillage 18 and 25 cm as a second factor and three speeds of tractor 2.55, 4.30 and 6.15 km.h-1 as a third factor. Moldboard plow recorded least traction force 7.550 kN, drawbar power 11.583 hp, power losses due to slippage 1.088 hp, power on the rear axle of the tractor 15.770 hp and brake horse power 17.495 hp. Chisel plow recorded best traction efficiency 76.217 % and total traction efficiency 68.659 %. Depth of tillage 18 cm recorded least traction force 7.837 kN, drawbar power 12.190 hp, power losses due to slippage 0.986 hp. Speed tractor 2.55 km.h-1 recorded least traction force 8.246 kN, drawbar power 7.329 hp, power losses due to slippage 0.618 hp, resistance power losses due to motion 1.775 hp and power on the rear axle of tractor 9.723 hp. Correlation among performance indicators were positive and negative correlation significantly, also were insignificant correlation.

Publication Date
Thu Apr 27 2023
Journal Name
Journal Of The Faculty Of Medicine Baghdad
A Review Article of Streptococcus Pyogenes Infection: Rick Factors, Prevention and Management Strategies
...Show More Authors

الخلفية: العقدية المقيحة المعروفة أيضًا باسم ""(GAS) هي احدى مسببات الأمراض ذات الأهمية الصحية العامة، حيث تصيب 18.1 مليون شخص في جميع أنحاء العالم وتقتل 500000 شخص كل عام. الهدف: حددت هذه المراجعة المقالات المنشورة حول عوامل الخطر واستراتيجيات الوقاية والسيطرة لأمراض المكورات العقدية. المواد والأساليب: تم إجراء بحث منهجي لتحديد الأوراق المنشورة على قواعد البيانات الإلكترونية Web of Science و PubMed و Scopus و Google Scholar في مح

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Physical Mesomechanics Of Condensed Matter: Physical Principles Of Multiscale Structure Formation And The Mechanisms Of Nonlinear Behavior: Meso2022
Effect of L-cysteine capping the CdSe, CdSe:CdS on structural and morphological properties
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Plant Archives
Effects of bacterocin from MRSA and pseudomonas aeruginosaagainst biofilm of food born pathogen
...Show More Authors

Scopus (6)
Scopus
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Craniofacial Surgery
Effect of Platelet-Rich Fibrin and Bone Morphogenetic Protein on Dental Implant Stability
...Show More Authors

Abstract: Recombinant human bone morphogenetic protein-2 (rhBMP-2) and platelet-rich fibrin (PRF) bioactive materials have been used to enhance healing and improve dental implant stability. This study aimed to compare the effect of rhBMP-2 and PRF bioactive materials on dental implant stability at different intervals and to evaluate the correlation of implant length and diameter with implant stability. Two bioactive materials were compared to evaluate their effect on dental implant stability. A total of 32 patients (102 dental implants) were divided into 3 groups: 24 dental implants with bone morphogenetic protein (BMP), 27 dental implants with PRF, and 51 dental implants without BMP or PRF (control group). Data were statistically analyzed

... Show More
View Publication
Scopus (17)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Neuroquantology
Electronic Transfers and (NLO) Properties Predicted by AB Initio Methods with Prove Experimentally
...Show More Authors

Hartree-Fock (HF) method relies in the calculations of nonlinear optical properties (NLO) for benzoic acid molecule. Also, another theoretical study is conducted by using the TD-DFT Density Functional Theory through B3LYP/High Base Set 6-311++G (2d,2p) on Gaussian program09. Moreover, an experimental study has been done to obtain the electrons spectrum for benzoic acid with and without ethanol. While the experimental study is done by using UV/VIS. spectrophotometer. Energy gap values of electronic transition between HOMO and LUMO is obtained from theoretical and experimental results. Consequently, the theoretical result for determining the energy gap calculated from EHOMO-LUMO wasvery close to the results of UV / VIS. spectrum. A theoretica

... Show More
View Publication
Scopus (32)
Crossref (23)
Scopus Crossref
Publication Date
Wed Jul 31 2024
Journal Name
Cureus
Neuro-Ophthalmic Manifestations of Carotid Cavernous Fistulas: A Systematic Review and Meta-Analysis
...Show More Authors

View Publication
Crossref (4)
Clarivate Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Attitude and Altitude Control of Quadrotor Carrying a Suspended Payload using Genetic Algorithm
...Show More Authors

The need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Apr 25 2013
Journal Name
Isprs International Journal Of Geo-information
Using Geometric Properties to Evaluate Possible Integration of Authoritative and Volunteered Geographic Information
...Show More Authors

The assessment of data quality from different sources can be considered as a key challenge in supporting effective geospatial data integration and promoting collaboration in mapping projects. This paper presents a methodology for assessing positional and shape quality for authoritative large-scale data, such as Ordnance Survey (OS) UK data and General Directorate for Survey (GDS) Iraq data, and Volunteered Geographic Information (VGI), such as OpenStreetMap (OSM) data, with the intention of assessing possible integration. It is based on the measurement of discrepancies among the datasets, addressing positional accuracy and shape fidelity, using standard procedures and also directional statistics. Line feature comparison has been und

... Show More
View Publication
Scopus (29)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (29)
Scopus Clarivate Crossref