A field experiment was conducted during the spring season 2020 in Karbala proving/ Al-Sharia Distrit, located at latitude N 32° 42' 13.8" and longitude E 43° 54' 36.6" and at an altitude of 27 m above sea level. The experiment included a study of two factors: the first, Irrigation Interval, three treatments were used: irrigation treatment every 2 days, Irrigation treatment every 4 days, and Irrigation treatment every 6 days. The second factor is the addition of soil conditioners, in which four treatments were used: the control treatment without any addition, the treatment of adding bio-organic fertilizers, the treatment of adding water-conserving technology (polymer), and the treatment of adding water-conserving technology + fertilizers Organic vitality. The experiment was designed according to the randomized complete block design (RCBD) with three replicates and under the split block design (split block design).It use the results of regional climate models to highlight how climate change affects the region through the AquaCrop model and repeat the same process for another regional climate model and another scenario to assess the impact using climate projections and analyzing the impact of climate change on water resources, the results were as follows: An increase in the amount of annual rainfall and monsoon rain during the two periods (2016-2035) and (2046-2065) under the RCP4.5 scenario, amounting to 17.00, 9.42, 11.91, and 9.06 mm. respectively compared to the base period (1985-2005) and its increase during the period (2016-2035) according to the RCP8.5 scenario amounted to 3.97 and 4.51 mm, with a slight decrease during the period (2046-2065) amounting to -3.78 and -2.57 mm, respectively, compared to base period. An increase in the maximum and minimum temperatures, according to the climate change scenario RCP4.5, amounted to 0.81, 0.75, 1.65, and 1.55°C, and the RCP8.5 scenario amounted to 1.1, 0.98, 2.33, and 2.14°C, as an average of the values of climate models. (EC-Earth, CNRM-CM5, GFDL-ESM2M) for the maximum and minimum temperatures, respectively, during the period (2016-2035) and (2046-2065), compared to the base periodd. There were no significant differences between the current productivity of the potato crop and the expected productivity using the AquaCrop model, so the value of R2 was 0.85 between the expected and measured data for productivity for twelve years under the surface drip irrigation system.The correlation coefficient (r) was 0.951, the root mean square error (RMSE) was 2.426, and the efficiency coefficient was 0.659 for the surface drip irrigation system.
This study employs wavelet transforms to address the issue of boundary effects. Additionally, it utilizes probit transform techniques, which are based on probit functions, to estimate the copula density function. This estimation is dependent on the empirical distribution function of the variables. The density is estimated within a transformed domain. Recent research indicates that the early implementations of this strategy may have been more efficient. Nevertheless, in this work, we implemented two novel methodologies utilizing probit transform and wavelet transform. We then proceeded to evaluate and contrast these methodologies using three specific criteria: root mean square error (RMSE), Akaike information criterion (AIC), and log
... Show MoreThe main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators
The presence of a single complex adaptive weight in each element channel of an adaptive array antenna is sufficient for processing of narrowband signals. The ability of an adaptive array antenna to null interference deteriorates rapidly as the interference bandwidth increases. The performance of narrowband adaptive array antenna with LMCV Beamforming algorithm is examined. The interaction effects between received signal angle of arrival and array parameters like the interelement spacing and the number of array element and the received signal bandwidth were studied. The output Signal to Interference plus Noise Ratio (SINR) and Interference to Noise Ratio (INR) are used as performance parameters for evaluation of these effects. It is found
... Show MoreDie Forschung geht um das wichtigste Thema für die literarischen Studien, die um die literarische Übersetzung und die Deutlichkeit dem Leser gekreist sind. Die literarische Übersetzung ist ein schwieriger Prozess, der auf vielseitigen Faktoren beruht ist, damit es erfolgreich gelungen ist. Dies ist auch ein gemeinsamer Prozess durch das Kunstwerk zwischen dem Autor und Übersetzer, so dass der erste Schritt in der vorliegenden Forschung wie folgendes lautet: muss es der Autor genau bestimmt wird, wie er die methodischen Grundprinzipien des Wekes im Dienst der zentralen Idee formuliert, und wie er die literarische Gestalt durch die voll erfassende Vorstellung des Wekes dichtet. Denn die literarische Arbeit besteht aus zwei Teilen
... Show MoreThis paper includes a comparison between denoising techniques by using statistical approach, principal component analysis with local pixel grouping (PCA-LPG), this procedure is iterated second time to further improve the denoising performance, and other enhancement filters were used. Like adaptive Wiener low pass-filter to a grayscale image that has been degraded by constant power additive noise, based on statistics estimated from a local neighborhood of each pixel. Performs Median filter of the input noisy image, each output pixel contains the Median value in the M-by-N neighborhood around the corresponding pixel in the input image, Gaussian low pass-filter and Order-statistic filter also be used.
Experimental results shows LPG-
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThe present study aims to develop and apply the unrealistic optimism scale among high school students. The researcher has designed a scale of (38) paragraphs to measure the unrealistic optimism. A sample of (200) male and female students were chosen randomly to collect the needed data. The study found that the unrealistic scale of optimism has good psychometric characteristics. The research sample has a high level of التفاؤل غير الواقعي لدى عينة البحث unrealistic optimism. There is a statistically significant difference between male and female in the unrealistic optimism in favor of the male students. Finally, there is a statistically significant difference between students in the fourth and sixth gra
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreAn annular two-phase, steady and unsteady, flow model in which a conductingfluid flow under the action of magnetic field is concavely. Two models arepresented, in the model one; the magnetic field is perpendicular to the long side ofthe channel, while in the model two is perpendicular to the short side. Also, westudy, to some extent the single-phase liquid flow.It is found that the motion and heat transfer equations are controlled by differentdimensionless parameters namely, Reynolds, Hartmann, Prandtl, and Poiseuilleparameters. The Laplace transform technique is used to solve each of the motion andheat transfer equations. The effects of each of dimensionless parameters upon thevelocity and heat transfer is analyzed.A comprehensive study fo
... Show MoreEprospective study undertaken between January 2007 and January 2011, 58 consecutive cases with compound tibial shaft fractures. All fractures were stabilized by external fixator device AO/ASIF type after failed the manipulation under anesthesia (MUA) to restore the osseous alignment. In 32 patients cancellous bone graft were used from the upper part of the tibia to enhance healing process, all these patients were followed for an average of 8–12 months. Our findings showed that stabilization of the fracture shaft tibia by external fixation with cancellous bone graft had significantly better result, than external fixation alone. We conclude that unilateral, uniplanar external fixation with early bone grafting from upper part of the tibia is
... Show More