The meteorite with a single total mass of 630 gm as a visible meteorite has fallen on 22 March 2021, at 10:00 a.m. in Al-Sherqat subdistrict within Salah Al-Din, northern Iraq; and therefore, was named Al-Sherqat meteorite by the authors. It is characterized by a uniform structure of coherent and medium degree of malleability. It is of a well-crystalline structure and not homogeneous in composition. The Al-Sherqat meteorite is composed of metallic phases of 7.6 gm/cm3 density exhibiting an oriented intergrowth of kamacite (α-FeNi) with taenite showing a Widmanstätten pattern on an etched polished section with the finest octahedrite kamacite bandwidth of less than 0.2 mm. It is composed of Fe (86.9 wt%), Ni (9.63 wt%), P (1.31 wt%), S (0.628 wt%), Ti (0.623 wt%), Co (0.446 wt%), Mo (0.146 wt%), Cr (0.103 wt%), Cu (0.141 wt%), V (300 ppm), Nb (220 ppm), W (53 ppm), Ag (50 ppm), Pb (30 ppm), Zn (20 ppm), Sb (16 ppm), Sn (10 ppm) and As (3 ppm). Al-Sherqat meteorite was structurally classified as an iron meteorite belongs to the plessitic group (Opl)) with octahedrite finest bands (less than 0.2 mm) of the kamacite lamellae. Kamacite platelets in Al-Sherqat meteorite are almost not a continuous plate network. Chemically, it belongs to the IIC type of magmatic group based on the amount of nickel (9.63%), where IIC is typically octahedrites has 9.3 – 11.5% Ni. The presence of kamacite, taenite, schreibersite, daubréelites, pentlandite, chromite, and wusite in Al-Sherqat meteorite are in accordance with IIC group of the iron meteorites. Al-Sherqat meteorite belongs to M-type considering a metallic core fragmented by impact asteroid. The most probable source of this meteorite is the core of an asteroid that melted early in its history.
Strives Total Productive Maintenance to increase the overall effectiveness of the equipment through the early involvement in the design and manufacture of equipment productivity. It also operates in an environment of simultaneous engineering work on the synchronization of activities to take advantage of early information by maintenance engineers, design, operation, and that helps to reduce the faults and facilitate future maintenance tasks.
Has adopted a search in the theoretical concept of the total maintenance productivity and concurrent engineering activities carried out during which the conjunction a
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MorePrecision irrigation applications are used to optimize the use of water resources, by controlling plant water requirements through using different systems according to soil moisture and plant growth periods. In precision irrigation, different rates of irrigation water are applied to different places of the land in comparison with traditional irrigation methods. Thus the cost of irrigation water is reduced. As a result of the fact that precise irrigation can be used and applied in all irrigation systems, it spreads rapidly in all irrigation systems. The purpose of the Precision Agriculture Technology System (precision irrigation) , is to apply the required level of irrigation according to agricultural inputs to the specified location , by us
... Show More
Background: Thyroid operation needs very meticulous haemostasis to have minimal morbidity and mortality.
Objectives: Assessment of harmonic knife in open thyroid surgery as anew haemostatic procedure .
Type of the study: Cross-sectional study.
Methods: This study had been conducted at Alkindy teaching hospital in Baghdad city from the 1st of May 2013 to the 1st of January 2017 on 229 goiterous patients who needs thyroidectomy(36 males,193 females),divided in 2 groups according to the haemostatic procedure used during their operations, Group A (15 males,85females)using the usual conventional surgery(
... Show MoreBACKGROUND: Coronavirus current pandemic (COVID-19) is the striking subject worldwide hitting countries in an unexplained non-universal pattern. Bacillus Calmette–Guérin (BCG) vaccine was an adopted recent justification depending on its non-specific immune activation properties. Still the problem of post-vaccine short duration of protection needs to be solved. The same protective mechanism was identified in active or latent tuberculosis (TB). For each single patient of active TB, there are about nine cases of asymptomatic latent TB apparently normal individuals living within the community without restrictions carrying benefits of immune activation and involved in re-infection cycles in an excellent example of repeated immunity tr
... Show MoreIn this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data sets
This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ
... Show More