Dust storms are typical in arid and semi-arid regions such as the Middle East; the frequency and severity of dust storms have grown dramatically in Iraq in recent years. This paper identifies the dust storm sources in Iraq using remotely sensed data from Meteosat-spinning enhanced visible and infrared imager (SEVIRI) bands. Extracted combined satellite images and simulated frontal dust storm trajectories, using the Hybrid Single Particle Lagrangian Integrated Trajectory (HYSPLIT) model, are used to identify the most influential sources in the Middle East and Iraq. Out of 132 dust storms in Iraq during 2020–2023, the most frequent occurred in the spring and summer. A dust source frequency percentage map (DSFPM) is generated using ArcGIS software. The regions located in Iraq, Saudi Arabia, Syria, and Jordan are the largest dust storm sources. New dust sources are identified in Iraq’s southwestern and western regions, such as Al-Nukhaib, Wadi Hauran, and Sinjar, along with new sources in Saudi Arabia, Jordan, and Syria. The most common sources are concentrated in Iraq (55.31%), mainly in the Tigris and Euphrates basin, western desert, and Al-Jazeera region, followed by Syria (19.55%), Saudi Arabia (12.29%), and Jordan (11.73%). The highest dust storm source frequency in Iraq is found in the Al- Samawa desert’s southern region (27.37%). Also, the highest frequency of dust sources from each country is determined. Knowing the origins and trajectories of dust storms will enhance treatments of these causes and their consequences on the environment and socio-economics of the region. It contributes to the support of specialised regional agencies to mitigate this phenomenon.
The meteorological data recorded in Al-Hilla station for the period (1984-2014) were used to describe the climatic condition of the Greater Musaiyab Project lies in Babylon Governorate, 90Km southern of Baghdad City, central of Iraq. This study found that the summation of rainfall is (112.323 mm), average of relative humidity (47.44%), temperature (25.55 C◦), sunshine (8.748 h/day) and the total of evaporation is (2268.463 mm). In this research, three classifications were applied to find the type of climate in the study area. The results of the climate classification show that, the climate of study area is characterized by dry and relatively hot in summer, and cold with low rain in winter. Thornthwiat equation was used to determine the
... Show MoreStable isotope composition of δ2H and δ18O was investigated in the water resources of the Shwan sub-Basin northeast of Iraq. The study objects conceived the possible factors that affect the stable isotopes’ composition in precipitation additionally to achieve information concerning recharge processes and estimate the groundwater recharge sources. In this study, four precipitation samples were collected at the study area for the 2020–2021 hydrological year. Thirty-two groundwater samples and one surface water sample from Lesser Zab River (LZR) were collected during the same period for two sampling seasons. The results of observed meteorological data show a very small amount of pr
An extensive survey of citrus leaf miner (CLM) , Phyllocnistis citrella Stainton parasites
and predators was conducted during 1998 and 1999 in citrus orchards and nursuries in
Baghdad, Diyala and Wasit .Five eulophid parasites were recorded for the first time on citrus
leaf miner larvae , prepupae and pupae viz. Cirrospilus sp, Pnigalio sp ., Ratzburgiola
incompleta , Tetrasticus sp. and, Neochrysocharis formosa . Parasitism rate was ranged from
15% to 63% Chrysopa carnea , Orius albidipennis , Amblyseius sp . Were observed as
predators on CLM .
The seismic method depends on the nature of the reflected waves from the interfaces between layers, which in turn depends on the density and velocity of the layer, and this is called acoustic impedance. The seismic sections of the East Abu-Amoud field that is located in Missan Province, south-eastern Iraq, were studied and interpreted for updating the structural picture of the major Mishrif Formation for the reservoir in the Abu-amoud field. The Mishrif Formation is rich in petroleum in this area, with an area covering about 820 km2. The seismic interpretation of this study was carried out utilizing the software of Petrel-2017. The horizon was calibrated and defined on t
... Show MoreThis study was designed for isolation and molecular identification of Nontuberculous Mycobacterium (NTM) from fish during the period between October and December 2017 from Karbla province, Iraq. This study included 200 fresh fish samples from four different species including Spondyliosoma cantharus, Liza abu, Carassius carassius and Cyprinuscarpio. Three samples of each fish were taken including gills, muscles and all internal organs. The samples were processed by decontamination, concentration of 4% sodium hydroxide, and 0.1 ml of sediment was streaking on Löwenstein Johnson (LJ) media; then the bacterial cultures were incubated at 28-30 °C for 3days up to 4 weeks and suspected colonies were stained with acid fast stain to confir
... Show MoreIn recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony al
... Show MoreRecent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More