The gravity method is a measurement of relatively noticeable variations in the Earth’s gravitational field caused by lateral variations in rock's density. In the current research, a new technique is applied on the previous Bouguer map of gravity surveys (conducted from 1940–1950) of the last century, by selecting certain areas in the South-Western desert of Iraqi-territory within the provinces' administrative boundary of Najaf and Anbar. Depending on the theory of gravity inversion where gravity values could be reflected to density-contrast variations with the depths; so, gravity data inversion can be utilized to calculate the models of density and velocity from four selected depth-slices 9.63 Km, 1.1 Km, 0.682 Km and 0.407 Km. The depths were selected using the power spectrum analysis technique of gravity data. Gravity data are inverted based on gravitational anomalies for each depth slice or level and the extracted equivalent depth data from available wells using a connection curve between densities and velocities, which were mostly compatible with Nafe and Drake's standard curve. The inverted gravity data images highlight the behavior of anomalies/structures in the model and domain of density/velocity, which can be utilized in the processing of the recorded seismic data and time to depth conversion, in parallel with available well's data information within the intended study area of South-Western Iraq.
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreCOVID-19 is a disease that has abnormal over 170 nations worldwide. The number of infected people (either sick or dead) has been growing at a worrying ratio in virtually all the affected countries. Forecasting procedures can be instructed so helping in scheming well plans and in captivating creative conclusions. These procedures measure the conditions of the previous thus allowing well forecasts around the state to arise in the future. These predictions strength helps to make contradiction of likely pressures and significances. Forecasting procedures production a very main character in elastic precise predictions. In this case study used two models in order to diagnose optimal approach by compared the outputs. This study was introduce
... Show MoreBackground: Osteoporosis is an extra-articular complication of rheumatoid arthritis that results in increased risk of fractures and associated morbidity, mortality, and healthcare costs. Objective: To evaluate changes in bone mineral density in a sample of rheumatoid arthritis (RA) patients on biological (anti tumor necrosis factor (TNF) alpha) and non-biological agent disease modifying antirheumatic drugs (DMARDs). Patients and Methods: A cross sectional study enrolled 60 RA patients diagnosed by rheumatologist according to the 2010 American College of Rheumatology/European League Against Rheumatism (2010 ACR/EULAR) classification criteria for RA. Thirty patient on biological agent (anti TNF alpha) and 30 patient on non-biological agent (D
... Show MoreThe research work is "The passive voice as a grammatical phenomenon in four selected textbooks". The research deals with the grammatical phenomenon passive in German. The research consists of two parts, the theoretical and the empirical part. The present research work is divided into 3 sections:
The first section includes the definition of passive, passive types, process passive, state passive, passive with modal verbs, and other types of passive. The second section provides illustrations of the four selected textbooks. The third chapter presents the passive voice in textbooks, namely German language teaching for foreigners by Dora Schulz and Heinz Griesbach, Delfin von Aufderstrasse H. and others, Em von Balme, M. and others and
... Show MoreThe study is situated in the Kokoe Region of Central Buton Regency, Southeast Sulawesi, specifically in the southern part of Kabaena Island. Its primary objective is to assess the potential of nickel laterite in the designated area. The research methodology involved microscopic analysis of bedrock using a polarizing microscope, examining the drilling data, including logging descriptions, and utilizing XRF geochemical analysis (Ni, Fe, Al2O3, Co, Mg, and SiO2) from 32 drilling sites. Both elementary grade and laterite profiles were visualized using Strater 5 software to simplify the representation of laterite profiles. Petrographic analysis divided the bedrock into two lithological units: serpentinized lherzolite and serpentinite. Th
... Show More