This study aims to calculate the percentage of loss and its causes of the horticultural crops tangerines and Seville oranges in Baghdad governorate for the 2020 agricultural season and estimate the economic impacts of losses both crops tangerines and Seville oranges at the study samples level. The research followed both methods descriptive and the quantitative mathematical in estimating the loss of horticultural crops from tangerines and Seville oranges trees and calculating the economic impact of this loss. The results showed that the percentage of losses of tangerines and Seville oranges crops on the level of wholesalers was about 12% and 13% respectively; causing economic losses estimated at about 3184.41 Euro. The results also displayed that the rate of total cash losses, average total lost areas, average wasted water, and average wasted fertilizers, at the level of plantation owner were estimated at 234.8 Euro, 2.9 ha, 17469.6 m3 and 580 kg for each of them, respectively. In light of these results, it is necessary to identify the most important factors that reduce or limit agricultural waste for achieving the dominant strategic goal of food security.
This study offers numerical simulation results using the ABAQUS/CAE version 2019 finite element computer application to examine the performance, and residual strength of eight recycle aggregate RC one-way slabs. Six strengthened by NSM CFRP plates were presented to study the impact of several parameters on their structural behavior. The experimental results of four selected slabs under monotonic load, plus one slab under repeated load, were validated numerically. Then the numerical analysis was extended to different parameters investigation, such as the impact of added CFRP length on ultimate load capacity and load-deflection response and the impact of concrete compressive strength value on the structural performance of
... Show More
Shear and compressional wave velocities, coupled with other petrophysical data, are vital in determining the dynamic modules magnitude in geomechanical studies and hydrocarbon reservoir characterization. But, due to field practices and high running cost, shear wave velocity may not available in all wells. In this paper, a statistical multivariate regression method is presented to predict the shear wave velocity for Khasib formation - Amara oil fields located in South- East of Iraq using well log compressional wave velocity, neutron porosity and density. The accuracy of the proposed correlation have been compared to other correlations. The results show that, the presented model provides accurate
... Show MoreComposite materials are widely used in the engineered assets as aerospace structures, marine and air navigation owing to their high strength/weight ratios. Detection and identification of damage in the composite structures are considered as an important part of monitoring and repairing of structural systems during the service to avoid instantaneous failure. Effective cost and reliability are essential during the process of detecting. The Lamb wave method is an effective and sensitive technique to tiny damage and can be applied for structural health monitoring using low energy sensors; it can provide good information about the condition of the structure during its operation by analyzing the propagation of the wave in the
... Show MoreBACKGROUND: The humeral shaft fractures have a good rate of union, despite this fact, still there is a significant rate of nonunion after nonoperative treatment and more often after operative treatment. AIM: The aim of the study is to evaluate the autogenous onlay graft with compression plate for treatment of persistent humeral shaft non-union with failed previous surgery both radiological and functional outcome. MATERIALS AND METHODS: A prospective study on twenty patients having persistent aseptic non-union age between 20 and 60 years old, after failed surgical treatment of fractures humeral shaft in Al-Zahra teaching and Al-Kindy teaching hospitals, while infected nonunion, diabetes mellitus, secondary metastasis, smoking, a
... Show MoreWe aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure
Release of industrial effluents comprising dyes in water bodies is one of the foremost causes of water pollution. Therefore, the proper and proficient treatment of these dyes contaminated left-over material before their release is crucial. Herein, an eco-friendly biological macromolecule Gum-Acacia (GA) integrated Fe3O4 nanoparticles composite hydrogel was manufactured via co-precipitation technique for effective adsorption of Congo red (CR) dye existing in water bodies. The as-prepared magnetic GA/Fe3O4 composite hydrogel was characterized by FTIR, XRD, EDX, VSM, SEM, and BET techniques. These studies discovered the fruitful fabrication of biodegradable magnetic GA/Fe3O4 composite hydrogel possessing porous structure with large surface are
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show More