The aim of this paper is to design artificial neural network as an alternative accurate tool to estimate concentration of Cadmium in contaminated soils for any depth and time. First, fifty soil samples were harvested from a phytoremediated contaminated site located in Qanat Aljaeesh in Baghdad city in Iraq. Second, a series of measurements were performed on the soil samples. The inputs are the soil depth, the time, and the soil parameters but the output is the concentration of Cu in the soil for depth x and time t. Third, design an ANN and its performance was evaluated using a test data set and then applied to estimate the concentration of Cadmium. The performance of the ANN technique was compared with the traditional laboratory inspecting using the training and test data sets. The results of this work show that the ANN technique trained on experimental measurements can be successfully applied to the rapid estimation of Cadmium concentration
The analysis of the root cause techniques is a reasonable option to be made to assess the root causes of the funding of construction projects. There are a variety of issues related to financing in construction industries in Iraq. The root,cause analysis is the impact of security and social conditions on financial funding. Variety tools of root cause analysis have originated from literature, as common methods for the detection of root causes. The purpose of this study was to identify and diagnose causes that lead to obstruction of financial funding in the construction projects in the republic of Iraq from the contractors' point of view and their interaction with a number of variables. The study diagnosed nine causes of fi
... Show MoreThis paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p
... Show MoreBiological samples of mother's milk were collected from Iraqi southern provinces(Basrah,Messan,al-Muthana,Thikar)and Baghdad province to measure uranium concentration of the samples by using track technique of fission fragments as a result from uranium atom fission with thermal neutrons from neutrons source 24 I Am-Be with activity 16Ci and neutron flux of 5000 n/cm2.s on using nuclear track detector CR-39 It was found that the high percentage of depleted uranium concentration on the samples from Muthana province , which accounted as 4.183ppm therefore the samples was taken from the provinces (Thikar,Basrah,Baghdad),which was accounted the depleted uranium concentration as following (1.243,2.172,2.875) ppm respectively, with appear a small
... Show MoreNumerous regions in the city of Baghdad experience the congestion and traffic problems. Due to the religious and economic significance, Al-Kadhimiya city (inside the metropolitan range of Baghdad) was chosen as study area. The data gathering stage was separated into two branches: the questionnaire method which is utilized to estimate the traffic volumes for the chosen roads and field data collection method which included video recording and manual counting for the volumes entering the selected signal intersections. The stage of analysis and evaluation for the seventeen urban roads, one highway, and three intersections was performed by HCS-2000 software.The presented work plots a system for assessing the level of service
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThe major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
In this study, the ability of pistachio shells, as an unconventional adsorbent, to recover thallium cations from contaminated aqueous solutions was investigated. To achieve the objective of the study, practical experiments were conducted using a batch-mode adsorption unit under various operating conditions. The results obtained showed that the pistachio shells have the ability to remove thallium cations with a high efficiency exceeding 86% at room temperature. The results indicated that the maximum treatment efficiency was achieved at values of 7, 350 rpm, 86 ppm, 5 g, 150 min of pH, agitation speed, initial concentration of thallium, dosage of pistachio shell used, and contact time, respectively. Morphological results confirmed tha
... Show MoreIn this work, monitoring of monthly variation (from May 2016 to October 2016) in the concentration of the metals (Co, Zn, Cd, Pb, Ni and Fe) from Al-Diwaniya city of Iraq. Investigation about the pollution with these metals was achieved from five selected sites locate in study area by flame atomic absorption spectroscopy. The results showed a wide variation in the levels of heavy metals from site to site and from month to month. A total of 180 surface soil samples were analyzed to detecting the pollution with selected samples. The resultsshowed that the highest concentration with Ni was 6.290 mg kg-1 while the lowest concentration detected with Ni was 0.080 mg kg-1. The results of pollution index (enrichment factor, contamination factor, po
... Show MoreThe petrophysical analysis is significant to determine the parameters controlling the production wells and the reservoir quality. In this study, Using Interactive petrophysics software to analyze the petrophysical parameters of five wells penetrated the Zubair reservoir in the Abu-Amood field to evaluate a reservoir and search for hydrocarbon zones. The available logs data such as density, sonic, gamma ray, SP, neutron, and resistivity logs for wells AAm-1, AAm-2, AAm-3, AAm-4, and AAm-5 were used to determine the reservoir properties in Zubair reservoir. The density-neutron and neutron-sonic cross plots, which appear as lines with porosity scale ticks, are used to distinguish between the three main lithologies of sandstone, limesto
... Show More