The gravity method is a measurement of relatively noticeable variations in the Earth’s gravitational field caused by lateral variations in rock's density. In the current research, a new technique is applied on the previous Bouguer map of gravity surveys (conducted from 1940–1950) of the last century, by selecting certain areas in the South-Western desert of Iraqi-territory within the provinces' administrative boundary of Najaf and Anbar. Depending on the theory of gravity inversion where gravity values could be reflected to density-contrast variations with the depths; so, gravity data inversion can be utilized to calculate the models of density and velocity from four selected depth-slices 9.63 Km, 1.1 Km, 0.682 Km and 0.407 Km. The depths were selected using the power spectrum analysis technique of gravity data. Gravity data are inverted based on gravitational anomalies for each depth slice or level and the extracted equivalent depth data from available wells using a connection curve between densities and velocities, which were mostly compatible with Nafe and Drake's standard curve. The inverted gravity data images highlight the behavior of anomalies/structures in the model and domain of density/velocity, which can be utilized in the processing of the recorded seismic data and time to depth conversion, in parallel with available well's data information within the intended study area of South-Western Iraq.
In the present time, radioactive contamination is considered one of the most dangerous types of environmental pollution. It usually takes place because of a leakage of radioactive materials to one of the environment natural components, such as, water, air, and soil. Iraq is considered one of the most contaminated environments in the world; this is closely associated with the wars Iraq had suffered from; especially, in 1991 and 2003. Considering the importance of the radioactive contamination and its different health impacts on the population, the current paper is interested in studying this type of environmental contamination and its impact on the birth defects depending on the data available in the annual reports issued by the Iraqi min
... Show MoreThe current investigation included study of leaf surface epidermis beside indumentum for the species Galium aparine L., G. ceratopodum Boiss, G. setaceum Lam., G. spurium L., and G. tricornatum Dandy, the study showed that paracytic type of stomatal complex is the only type occur in leaf. The indumentum compose of eglandular hairs vary in their apices, length and occurrence of different part of plant body
This research aims to study and analyze the reality of monetary policy and financial sustainability in Iraq through either a descriptive or analytical approach by trying to link and coordinate between monetary policy and fiscal policy to enhance economic sustainability. The research is based on the hypothesis that the monetary policy of Iraq contributes to achieving financial stability, which improves economic sustainability by providing aid and assistance to the state to reduce the budget deficit and exacerbate indebtedness. The author used the monetary policy indicators, the re-deduction of Treasury transfers by the central bank and the money supply, and financial sustainability indicators, including the public debt indicators and the
... Show MoreFine aggregates used for concrete works in Sulaymaniyah city frequently fail to meet the standard requirements for gradation and fineness modulus in cement concrete. This paper aims to critically evaluate gradation, fineness modulus, and clay contents of various natural sands produced and used for concrete work in the region. Sixteen field sand samples were collected from various sites in Darbandikhan (5 samples), Qalat Dizah (5 samples), Koysinjaq (5 samples), and Piramagroon (1 sample) confirming to ASTM D75. The field samples were parted into test specimens based on ASTM C702. Then, sieve analysis was carried out on the oven-dry test specimens in compliance with ASTM C136. The test results of fine aggregates wer
... Show MoreOne wide-ranging category of open source data is that referring to geospatial information web sites. Despite the advantages of such open source data, including ease of access and cost free data, there is a potential issue of its quality. This article tests the horizontal positional accuracy and possible integration of four web-derived geospatial datasets: OpenStreetMap (OSM), Google Map, Google Earth and Wikimapia. The evaluation was achieved by combining the tested information with reference field survey data for fifty road intersections in Baghdad, Iraq. The results indicate that the free geospatial data can be used to enhance authoritative maps especially small scale maps.
Tourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More