Dust storms are typical in arid and semi-arid regions such as the Middle East; the frequency and severity of dust storms have grown dramatically in Iraq in recent years. This paper identifies the dust storm sources in Iraq using remotely sensed data from Meteosat-spinning enhanced visible and infrared imager (SEVIRI) bands. Extracted combined satellite images and simulated frontal dust storm trajectories, using the Hybrid Single Particle Lagrangian Integrated Trajectory (HYSPLIT) model, are used to identify the most influential sources in the Middle East and Iraq. Out of 132 dust storms in Iraq during 2020–2023, the most frequent occurred in the spring and summer. A dust source frequency percentage map (DSFPM) is generated using ArcGIS software. The regions located in Iraq, Saudi Arabia, Syria, and Jordan are the largest dust storm sources. New dust sources are identified in Iraq’s southwestern and western regions, such as Al-Nukhaib, Wadi Hauran, and Sinjar, along with new sources in Saudi Arabia, Jordan, and Syria. The most common sources are concentrated in Iraq (55.31%), mainly in the Tigris and Euphrates basin, western desert, and Al-Jazeera region, followed by Syria (19.55%), Saudi Arabia (12.29%), and Jordan (11.73%). The highest dust storm source frequency in Iraq is found in the Al- Samawa desert’s southern region (27.37%). Also, the highest frequency of dust sources from each country is determined. Knowing the origins and trajectories of dust storms will enhance treatments of these causes and their consequences on the environment and socio-economics of the region. It contributes to the support of specialised regional agencies to mitigate this phenomenon.
In this study, depleted uranium concentrations were calculated in sediments Diyala River samples , where 14 samples of sediment along the Diyala River were collected , starting from the Rustumiya area and ending with the Tuwaitha area after its confluence with the River Tigris , using the solid - state nuclear track detectors technique (SSNTDs). We found that the highest concentration of depleted uranium was in the sample (A-13), and was taken from the Tuwaitha area with the specific activity of the amount (78.1 ± 8.5 Bq/kg ) and the lowest concentration of the depleted uranium was in the sample (A-7), and was taken from the Azwaip area with the
... Show MoreThe type of groundwater in the studied area is slightly brackish. In general, the dominant water type is calcium-sulfate. The reasons behind these different chemical groundwater types can be referred to the active ion exchange between the groundwater of the Dammam aquifer and Rus Formation. The groundwater of the Dammam unconfined aquifer is not suitable for human drinking in all the parameters properties. The groundwater class is fair in the Qasir Al-Ukhaider area, while the Shebcha area and Al-Salman area are poor class except the eastern part of Al-Salman area is very poor.
The Mauddud Formation was one of the important and widespread Lower Cretaceous period formations in Iraq. It has been studied in three wells (EB. 55, EB. 58, and EB. 59) within the East Baghdad Oil Field, Baghdad, central Iraq. 280 thin sections were studied by microscope to determine fauna, the formation composed of limestone and dolomitized limestone in some parts which tends to be marl in some parts, forty species and genus of benthic foraminifera have been identified beside algae and other fossils, three biozones have been identified in the range which is: Orbitolina qatarica range zone (Late Albian), Orbitolina sefini range zone (Late Albian – Early Cenomanian) and Orbitolina concava range zone (Early Cenomanian), The age of
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreThe identification and sequencing of Amyloid Precursor Protien (APP) and presenilin (PS) opened the door for the engineering of transgenic mouse models to study pathogenic mechanisms of Alzheimer Disease (AD). The first successful mouse models over-expressed human APP with an Familiar AD (FAD) linked mutation in the brain. These mice exhibit Aß plaques, neuron loss, dystrophic neurites, inflammatory responses, learning impairments and deficits in synaptic transmission and/or long-term potentiation. The genotypes of all offspring of APP/PS1 mutant mice are analysed by Polymerise Chain Reactions. Generally there are two possibilities to analyse the DNA. The First, primers for APP or PS1 was used separately assuming that both genes are int
... Show MoreThis study aims to clarify areas of using information technology in accounting and its impact on the profession of auditors by reviewing the concept, types, areas and the importance of information technology and its implications on the audit profession as well as to clarify the extent of contribution of information technology in developing of procedures of the audit profession and what its requirement, also this study aims to enhance the theoretical side by identifying the views of a sample of auditors in Arab countries selected (Iraq, Syria, Jordan), for the extent of using of information technology in their work and level of their perception for the importance of that