This research was carried out to study the effect of plants on the wetted area for two soil types in Iraq and predict an equation to determine the wetted radius and depth for two different soil types cultivated with different types of plants, the wetting patterns for the soils were predicted at every thirty minute for a total irrigation time equal to 3 hr. Five defferent discharges of emitter and five initial volumetric soil moisture contents were used ranged between field capacity and wilting point were utilized to simulate the wetting patterns. The simulation of the water flow from a single point emitter was completed by utilized HYDRUS-2D/3D software, version 2.05. Two methods were used in developing equations to predict the domains of the wetting pattern. The principal strategy manages each soil independently and includes plotting, fitting, and communicating relevant connections for wetted zone and profundity, maximum error did not exceed 31.2%, modeling efficiency did not less 0.95, and root mean square error did not surpass 1.43 cm. The second strategy additionally treated each soil independently yet used electronic programming that uses different relapse methods for wetted territory and profundity, the maximum error did not exceed 15.64 %, modeling efficiency did not less 0.98, and root mean square error did not surpass 1.18 cm. a field test was directed to quantify the wetted radius to check the outcome acquired by the software HYDRUS-2D, contrast the estimation and the reproduced by the software. The after effects of the conditions to express the wetted radius and depth regarding the time of water system, producer release, and initial soil moisture content were general and can be utilized with great precision.
study aims to examine education and the challenges of globalization in light of Corona pandemic. The examination involves surveying a randomly selected sample from the University of Baghdad’s professors, particularly from the colleges of Education for Women, Arts, and Sciences. The purpose of this examination is to learn about the dimensions of globalization, its effects on the educational process, and the importance of distance education during the spread of Corona virus quarantine. To achieve this, the researcher followed a descriptive and analytical approach by applying a questionnaire to a sample of 70 teachers who were randomly selected electronically. Results have shown that 78.6% emphasized the contribution of globalization duri
... Show MoreThe extraction of Eucalyptus oil from Iraqi Eucalyptus Camadulensis leaves was studded using water distillation methods. The amount of Eucalyptus oil has been determined in a variety of extraction temperature and agitation speed. The effect of water to Eucalyptus leaves (solvent to solid) ratio and particle size of Eucalyptus leaves has been studied in order to evaluate the amount of Eucalyptus oil. The optimum experimental condition for the Eucalyptus oil extraction was established as follows: 100 C extraction temperature, 200 rpm agitation speed; 0.5 cm leave particle size and 6: 1 ml: g amount of water to eucalyptus leaves Ratio.
Poly urea formaldehyde –Bentonite (PUF-Bentonite) composite was tested as new adsorbent
for removal of mefenamic acid (MA) from simulated wastewater in batch adsorption
procedure. Developed a method for preparing poly urea formaldehyde gel in basic media by
using condensation polymerization. Adsorption experiments were carried out as a function of
water pH, temperature, contact time, adsorbent dose and initial MA concentration .Effect of
sharing surface with other analgesic pharmaceuticals at different pH also studied. The
adsorption of MA was found to be strongly dependent to pH. The Freundlich isotherm model
showed a good fit to the equilibrium adsorption data. From Dubinin–Radushkevich model the
mean free
Removal of heavy metal ions such as, cadmium ion (Cd 2+) and lead ion (Pb 2+) from aqueous solution onto Eichhornia (water hyacinth) activated carbon (EAC) by physiochemical activation with potassium hydroxide (KOH) and carbon dioxide (CO2) as the activating agents were investigated. The Eichhornia activated carbon was characterized by Brunauer Emmett Teller (BET), Fourier Transform Infrared spectroscopy (FTIR), and Scanning Electron Microscopy (SEM) techniques. Whereas, the effect of adsorbent dosage, contact time of pH, and metal ion concentration on the adsorption process have been investigated using the batch process t
The increasing number of orphans and their organizations and institutes in our community makes it increasingly important to design and develop an expert system that supports decisions concerning orphans and their families. This system can be used by any orphans organization to facilitate its work.
The proposed work is designed to manage the Orphans and Families of Martyrs of Terrorism Expert System (OFMTES) by registry all information about all orphans to display mostly orphan deserves bill, data is entered for each orphan, and with each entry a counter is increased according to this input information; the output result represents the score for that orphan. Different orphans have different scores. Coloring is used to know the degree o
Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreIraq has a huge network of pipelines, transport crude oil and final hydrocarbon products as well as portable water. These networks are exposed to extensive damage due to the underground corrosion processes unless suitable protection techniques are used. In this paper we collect the information of cathodic protection for pipeline in practical fields (Oil Group in Al Doura), to obtain data base to understand and optimize the design which is made by simulation for the environmental factors and cathodic protection variables also soil resistivity using wenner four terminal methods for survey sites; and soil pH investigations were recorded for these selected fields were within 7-8, and recording the anodes voltage and its related currents for
... Show MoreExperimental and numerical studies have been conducted on the effects of bed roughness elements such as cubic and T-section elements that are regularly half-channel arrayed on one side of the river on turbulent flow characteristics and bed erosion downstream of the roughness elements. The experimental study has been done for two types of bed roughness elements (cubic and T-section shape) to study the effect of these elements on the velocity profile downstream the elements with respect to different water flow discharges and water depths. A comparison between the cubic and T-section artificial bed roughness showed that the velocity profile downstream the T-section increased in smooth side from the river and decrease in the rough side
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More
