The aim of this paper is to design artificial neural network as an alternative accurate tool to estimate concentration of Cadmium in contaminated soils for any depth and time. First, fifty soil samples were harvested from a phytoremediated contaminated site located in Qanat Aljaeesh in Baghdad city in Iraq. Second, a series of measurements were performed on the soil samples. The inputs are the soil depth, the time, and the soil parameters but the output is the concentration of Cu in the soil for depth x and time t. Third, design an ANN and its performance was evaluated using a test data set and then applied to estimate the concentration of Cadmium. The performance of the ANN technique was compared with the traditional laboratory inspecting using the training and test data sets. The results of this work show that the ANN technique trained on experimental measurements can be successfully applied to the rapid estimation of Cadmium concentration
A field experiment was conducted to grow the wheat crop during the fall season 2020 in Karbala province, north of Ain Al-Tamr District in two locations of different textures and parent materials. The first site (calcareous soil) with a sandy loam texture, is located at (44° 40′ 37′) east longitude and (32° 41′ 34′) north latitude, at an altitude of 32 m above sea level, and an area of 20 hectares. As for the second location (gypsum soil) with a loam texture, it is located at a longitude (45° 41′ 39′) east and a latitude (33° 43′ 34′ north) and at an altitude of 33 m above sea level and an area of 20 hectares. To find out the effect of different tillage systems on water productivity and wheat yield under center pivot irri
... Show MoreAn experiment was conducted to study how SAE 50 engine oil contaminated with diesel fuel affects engine performance. The engine oil was contaminated with diesel fuel at concentrations of 0%, 1%, and 3%. The following performance characteristics were studied: brake-specific fuel consumption, brake thermal efficiency, friction power, and exhaust gas temperature. Each treatment was tested three times. The three treatments (0%, 1%, and 3%) were analyzed statistically with a one-way ANOVA model at the 5% probability level to determine if the three treatments produced significant differences in engine performance. The statistical results showed that there were significant differences in engine performance metrics among the three treatments. The 3
... Show MoreArtificial pancreas is simulated to handle Type I diabetic patients under intensive care by automatically controlling the insulin infusion rate. A Backstepping technique is used to apply the effect of PID controller to blood glucose level since there is no direct relation between insulin infusion (the manipulated variable) and glucose level in Bergman’s system model subjected to an oral glucose tolerance test by applying a meal translated into a disturbance. Backstepping technique is usually recommended to stabilize and control the states of Bergman's class of nonlinear systems. The results showed a very satisfactory behavior of glucose deviation to a sudden rise represented by the meal that increase the blood glucose
... Show More
A field experiment was conducted during the agricultural season 2017-2018. In the research station of the Ministry of Agriculture AL Rasheed side, and within the activities and researches of the national program to develop wheat cultivation in Iraq, Two factors were experienced in the cultivation of wheat, The first factor is the method of cultivation of five treatments were used: : Treatment of the cultivation of wheat in the plots (B), Treatment of wheat crops on bed with 50 cm width (S1), 60cm (S2), 70cm (S3) and 80cm (S4), The second factor is irrigation levels depletion of 40, 60 and 80% of available water coded as W1, W2 and W3, respectively, The experiment was designed under randomized complete block design (RCBD) with three replicat
... Show MoreThe central marshes are one of the most important wetlands/ecosystems in the southern area of Iraq. This study evaluates the bed soil's mechanical, physical, and chemical properties at certain southern Iraqi central marshes sites. This was conducted to investigate their types and suitability for enhancing the agricultural reality of most field crops and for construction purposes. Soil samples were collected from 15 sites at 10-100 cm depth. Hence, numerous parameters were determined: index properties, unconfined compressive strength, direct shear strength, consolidation, texture, and sieve analysis, water content, specific gravity, dry density, permeability, pH, total soluble salts (TSS), organic materials (OM) and total sulfate con
... Show MoreThe central marshes are one of the most important wetlands/ecosystems in the southern area of Iraq. This study evaluates the bed soil's mechanical, physical, and chemical properties at certain southern Iraqi central marshes sites. This was conducted to investigate their types and suitability for enhancing the agricultural reality of most field crops and for construction purposes. Soil samples were collected from 15 sites at 10-100 cm depth. Hence, numerous parameters were determined: index properties, unconfined compressive strength, direct shear strength, consolidation, texture, and sieve analysis, water content, specific gravity, dry density, permeability, pH, total soluble salts (TSS), organic materials (OM) and total
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More