Surface drip irrigation is one of the most conservative irrigation techniques that help control providing water directly on the soil through the emitters. It can supply fertilizer and providing water directly to plant roots by drippers. One of the essential needs for trickle irrigation nowadays is to obtain more knowledge about the moisture pattern under the trickling source for various types of soil with various discharge levels with trickle irrigation. Simulation numerical using HYDRUS-2D software, version 2.04 was used to estimate an equation for the wetted area from a single surface drip irrigation in unsaturated soil is taking into account water uptake by roots. In this paper, using two soil types were used, namely sandy loam and clay loam, with three types of plants; (corn, tomato, and sweet sorghum). The soil wetting pattern was analyzed each half an hour for three hours of irrigation time and three initial soil moisture content. Equations for wetted radius and wetted depth were predicted and evaluated by utilizing the statistical parameters for the different hydraulic soil models (Model Efficiency (EF) and Root Mean Squares Error (RMSE)). The values RMSE does not exceed 0.40 cm, and EF is greater than 0.96 for all types of soil. These values were between the values obtained from program HYDRUS-2D and the values obtained from formulas. This shows that evolved formula can be utilized to describe the soil wetting pattern from the surface drip irrigation system. The relative error for the different hydraulic soil models was calculated and compared with Brooks and Corey's model, 1964. There was good agreement compared with different models. RMSE was 0.23 cm, while the relative error -1% and 1 for EF for wetted radius.
Activated carbon was Produced from coconut shell and was used for removing sulfate from industrial waste water in batch Processes. The influence of various parameter were studied such as pH (4.5 – 9.) , agitation time (0 – 120)min and adsorbent dose (2 – 10) gm.
The Langmuir and frandlich adsorption capacity models were been investigated where showed there are fitting with langmmuir model with squre regression value ( 0.76). The percent of removal of sulfate (22% - 38%) at (PH=7) in the isotherm experiment increased with adsorbent mass increasing. The maximum removal value of sulfate at different pH experiments is (43%) at pH=7.
Microbial water disinfection with UV rays is a universal technology. Disinfection is a method used to treat drinking water. This can be accomplished using physical and/or chemical processes. Physical Methods: Heating and UV rays are two main methods - UV rays to destroy cells and kill bacteria. The physical process generally gives drinking water an instant purification without producing harmful substances. However, there is no pollution in the water to ensure continuous cleaning. This study’s primary goal is to obtain environmentally safe drinking water in situations of water shortages and homes that lack clean water. Therefore, resort to appropriate home treatment. Therefore, an ex
The research problem has crystallized and in light of these capabilities, the level of performance depends on the application of modern training methods based on actual experimentation, and those methods aim to develop the components of achievement in this competition, including the quantities of exerting the distinctive strength with speed for the arms and feet, which reflects on good skillful performance because the skill of shooting by jumping forward and high forms A major role in achieving goals during the competition that qualifies the team to win, and through the follow-up of the researcher in the field and academic field, I noticed that there is a weakness in some physical abilities, which affects performance and skill level
... Show MoreThe Gaussian orthogonal ensemble (GOE) version of the random matrix theory (RMT) has been used to study the level density following up the proton interaction with 44Ca, 48Ti and 56Fe.
A promising analysis method has been implemented based on the available data of the resonance spacing, where widths are associated with Porter Thomas distribution. The calculated level density for the compound nuclei 45Sc,49Vand 57Co shows a parity and spin dependence, where for Sc a discrepancy in level density distinguished from this analysis probably due to the spin misassignment .The present results show an acceptable agreement with the combinatorial method of level density.
... Show MoreThe researchers have a special interest in studying Markov chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one of the ministries. Results are analyzed by applying Maximum likelihood estimation and Ordinary least squares methods resulting
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More