Abstract
The vegetative filter strips (VFS) are a useful tool used for reducing the movement of sediment and pesticide in therivers. The filter strip’s soil can help in reducing the runoff volume by infiltration. However, the characteristics of VFS (i.e., length) are not recently identified depending on the estimation of VFS modeling performance. The aim of this research is to study these characteristics and determine acorrelation between filter strip length and percent reduction (trapping efficiency) for sediment, water, and pesticide. Two proposed pesticides(one has organic carbon sorption coefficient, Koc, of 147 L/kg which is more moveable than XXXX, and another one
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
Measuring the efficiency of postgraduate and undergraduate programs is one of the essential elements in educational process. In this study, colleges of Baghdad University and data for the academic year (2011-2012) have been chosen to measure the relative efficiencies of postgraduate and undergraduate programs in terms of their inputs and outputs. A relevant method to conduct the analysis of this data is Data Envelopment Analysis (DEA). The effect of academic staff to the number of enrolled and alumni students to the postgraduate and undergraduate programs are the main focus of the study.
Based on the results of standard penetration tests (SPTs) conducted in Al-Basrah governorate, this research aims to present thematic maps and equations for estimating the bearing capacity of driven piles having several lengths. The work includes drilling 135 boreholes to a depth of 10 m below the existing ground level and three standard penetration tests (SPT) at depths of 1.5, 6, and 9.5 m were conducted in each borehole. MATLAB software and corrected SPT values were used to determine the bearing capacity of driven piles in Al-Basrah. Several-order interpolation polynomials are suggested to estimate the bearing capacity of driven piles, but the first-order polynomial is considered the most straightforward. Furthermore, the root means squar
... Show MoreThis study was conducted to assess the hydrocarbon degradation abilities of Sphingomonas paucimobilis, Pentoae species, Staphylococcus aureus, and Enterobacter cloacae, which isolated from diesel contaminated soil samples. Single strains and mixed bacterial consortia have been investigated their ability to degrade 1.0 % (v/v) of diesel oil in Bushnell- Haas medium as sole.carbon.and.energy.source. At temperature 30∘C, the individual.bacterial.isolates exhibited low growth and low degradation.than did the.mixed. bacterial.culture. After 28 days.of incubation the.combination.of four isolates degraded.an upper limit.of diesel 88.4%. This was. continued.by 85.1% by S. paucimobilis, 84 % by Pentoae sp., 79% by S.aureus, and
... Show MoreManganese sulfate and Punica granatum plant extract were used to create MnO2 nanoparticles, which were then characterized using techniques like Fourier transform infrared spectroscopy, ultraviolet-visible spectroscopy, atomic force microscopy, X-ray diffraction, transmission electron microscopy, scanning electron microscopy, and energy-dispersive X-ray spectroscopy. The crystal's size was calculated to be 30.94nm by employing the Debye Scherrer equation in X-ray diffraction. MnO2 NPs were shown to be effective in adsorbing M(II) = Co, Ni, and Cu ions, proving that all three metal ions may be removed from water in one go. Ni(II) has a higher adsorption rate throughout the board. Co, Ni, and Cu ion removal efficiencie
... Show MoreManganese sulfate and Punica granatum plant extract were used to create MnO2 nanoparticles, which were then characterized using techniques like Fourier transform infrared spectroscopy, ultraviolet-visible spectroscopy, atomic force microscopy, X-ray diffraction, transmission electron microscopy, scanning electron microscopy, and energy-dispersive X-ray spectroscopy. The crystal's size was calculated to be 30.94nm by employing the Debye Scherrer equation in X-ray diffraction. MnO2 NPs were shown to be effective in adsorbing M(II) = Co, Ni, and Cu ions, proving that all three metal ions may be removed from water in one go. Ni(II) has a higher adsorption rate throughout the board. Co, Ni, and Cu ion removal efficiencies were 32.79%, 75
... Show MoreThe successful implementation of deep learning nets opens up possibilities for various applications in viticulture, including disease detection, plant health monitoring, and grapevine variety identification. With the progressive advancements in the domain of deep learning, further advancements and refinements in the models and datasets can be expected, potentially leading to even more accurate and efficient classification systems for grapevine leaves and beyond. Overall, this research provides valuable insights into the potential of deep learning for agricultural applications and paves the way for future studies in this domain. This work employs a convolutional neural network (CNN)-based architecture to perform grapevine leaf image classifi
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show More