Volcaniclastic rocks of Al Muqdadiya Formation (Pliocene) in Injana area, southern Hemrin anticline, NE of Iraq, were studied ( petrographically, physically, mineralogically and geochemically , as well as the engineering properties) to assess the suitability of volcaniclastic rocks to use them in industry as refractories. The results show that the physical and engineering properties change with the temperature change. The bulk density and the specific gravity increase by increasing temperature while the apparent porosity, water sorption and the linear shrinkage decrease. On the other hand the compressive strength increase by increasing temperature. The volcaniclastics have very low thermal conductivi
... Show MoreThis study appears GIS techniqueand remote sensing data are matching with the field observation to identify the structural features such as fault segments in the urban area such as the Merawa and Shaqlawa Cities. The use of different types of data such as fault systems, drainage patterns (previously mapped), lineament, and lithological contacts with spatial resolution of 30m was combined through a process of integration and index overlay modeling technique for producing the susceptibility map of fault segments in the study area. GIS spatial overlay technique was used to determine the spatial relationships of all the criteria (factors) and subcriteria (classes) within layers (maps) to classify and map the potential ar
... Show MoreThe lead has adverse effects in contamination the aquatic environment, for this reason, a laboratory simulation was conducted using kaolinite collected from the Ga’ara Formation at western Iraq to be considered as a natural sorbent material that can be addressed Pb2+ from the aqueous environments. The Energy-Dispersive X-ray Spectroscopy and atomic absorption spectroscopy clarifying very fine grains and pure phase with a very little quantity of quartz and has a number of active sites for adsorption. The sorption of kaolinite for the Pb2+ has been carefully tested by several designed laboratory experiments. Five lead solutions of different concentrations (25, 50, 75, 100 and 125 ppm) were tested under different values of pH (1.3-9)
... Show MoreWireless communications are characterized by their fastest growth in history, as they used ever-evolving and renewed technologies, which have allowed them to spread widely. Every day, communication technology introduces a new invention with features that differ from its predecessor. Bell Laboratories first suggested mobile wireless communication services to the general population in the late 1940s. Still, it wasn't easy at that time to use on a large scale due to its high costs. This paper aims to describe the state of cellular mobile networks; by comparing the sources of electromagnetic pollution caused by these networks, measure the level of power density in some residential areas, and compare them with international standards adopted in
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
The geochemical study of the Oligocene-Miocene succession Anah, Euphrates, and Fatha formations, western Iraq, was carried out to discriminate their depositional environments. Different major and trace patterns were observed between these formations. The major elements (Ca, Mg, Fe, Mn, K, and Na) and trace elements (Li, V, Cr, Co, Ni, Cu, Zn, Ga, Rb, Sr, Zr, Cs, Ba, Hf, W, Pb, Th, and U) are a function of the setting of the depositional environments. The reefal facies have lower concentrations of MgO, Li, Cr, Co, Ni, Ga, Rb, Zr, and Ba than marine and lagoonal facies but have higher concentrations of CaO, V, and Sr than it. Whereas dolomitic limestone facies are enriched V, and U while depletion in Li, Cr, Ni, Ga, Rb, Sr, Zr, Ba, an
... Show MoreThis study aims to use claystone beds exposed in the Injana Formation (Late Miocene) at Karbala-Najaf plateau, middle of Iraq for the manufacturing of perforated and ordinary bricks. The claystone samples were assessed as an alternative material of the recent sediments, which are preferred to remain as agricultural land. The claystones are sandy mud composing of 29.1 - 39.1% clay, 37.2 - 54.8% silt and 14.1-26.8% sand. They consist of kaolinite, illite, chlorite, palygorskite, and montmorillonite with a lot of quartz, calcite, dolomite, gypsum and feldspar. Claystone samples were characterized by linear shrinkage 0.01 - 0.1%, volume shrinkage 0.1 - 0.9%, bulk density 1.2 - 2.11gm/cm3 (1.68 g / cm3 average), and the efflorescence is
... Show MoreThe research aims to study Sabkha mineralogy to determine the mineral types, the nature of the precipitation, and the patterns of salt crystallization. Two Sabkhas in Abu Ghraib, west of Baghdad, were studied. It was found that the Sabkhas were formed in flat ponds from saturated solutions in a semi-arid to arid climate. Halite predominates, followed by anhydrite and gypsum as evaporite minerals. As for the minerals of the Sabkha soil, it consisted of feldspar, calcite, quartz, and dolomite, in addition to the clay minerals represented by kaolinite, illite, and chlorite. Needle forms, hopper shapes, dendritic crystals, and polygon shapes are the main crystallization patterns dominantly found in the Sabkhas. All these types of crysta
... Show MoreThe friendly-environment geophysical methods are commonly used in various engineering and near-surface environmental investigations. Electrical Resistivity Imaging technique was used to investigate the subsurface rocks, sediments properties of a proposed industrial site to characterize the lateral and vertical lithological changes. via the electrical resistivity, to give an overview about the karst, weak and robust subsoil zones. Nineteen 2D ERI profiles using Wenner array with 2 m electrode spacing have been applied to investigate the specific industry area. One of these profiles has been conducted with one-meter electrode spacing. The surveyed profiles are divided into a number of blocks, each block consists of several parallel pr
... Show MoreThe need for an efficient method to find the furthermost appropriate document corresponding to a particular search query has become crucial due to the exponential development in the number of papers that are now readily available to us on the web. The vector space model (VSM) a perfect model used in “information retrieval”, represents these words as a vector in space and gives them weights via a popular weighting method known as term frequency inverse document frequency (TF-IDF). In this research, work has been proposed to retrieve the most relevant document focused on representing documents and queries as vectors comprising average term term frequency inverse sentence frequency (TF-ISF) weights instead of representing them as v
... Show More