This study presents determination of the paleostress magnitudes and orientation of Bekhme Structure in Shaqlawa area northeastern Iraq. Paleostress Analysis of slip-fault measurements is performed using Right dihedral, Lisle diagram and Mohr Circles methods. Depending on Mohr Circles, Bott law and vertical thickness, the magnitudes of the paleostress at the time of the tectonic activity were determined. Firstly, Georient Software was used to estimate the orientation of the paleostresses (σ1, σ2 and σ3). Secondly, using the rupture –friction law, taking into account depth of the overburden and the vertical stress (σv) was calculated to determine the magnitude of the paleostresses (σ1=4500 bars, σ2=1900 bars and σ3=700 bars). The high magnitudes of the principal stress axes may be referred to the active tectonic events which led to the deformation of the area during Cretaceous and Tertiary periods. The study area shows that the poles of the measured faults lie in the reactivated area of Mohr circles. This indicates the unstability of the study area. The study area is important, due to possibility of exiting of the hydrocarbon is deposited. Fold- Thrust belt mark the deformation fronts of the major orogeny that form from the collision of Arabian Plate with Turkish and Iranian Plates.
Lacing reinforcement plays a critical role in the design and performance of reinforced concrete (RC) slabs by distributing the applied loads more evenly across the slab, ensuring that no specific area of the slab is overloaded. In this study, nine slabs, divided into three groups according to the investigated parameters, were meticulously designed and evaluated to study the interplay between the lacing reinforcement and other key parameters. Each slab was crafted for simple support and was subjected to both static and repeated two-point load tests. The lacing reinforcement had an angle of 45° with various tension and lacing steel. The repeated-tested specimens with lacing reinforcement experienced smaller ductility than those of s
... Show MoreThis paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward
... Show MoreAbstract The percent study aimed to determination the association between infant feeding practices and Insulin-Dependent Diabetes Mellitus (IDDM). The study was conducted at (he National Center of Diabetes in Baghdad City the Capital of Iraq throughout the period of January 2001 to January 2002. The sample was comprised of (200) mother of Insulin-Dependent Diabetes Mellitus (IDDM) of children under age of 12 years old. Data was collected through the use of a questionnaire that constructed by researcher and which were developed for the purpose of the present study. Reliability of the instruments was dete
Resumen Introducción Debido a su exigente entorno académico, el dolor lumbar crónico (DLC) es un trastorno musculoesquelético común entre los estudiantes de medicina, lo cual es particularmente preocupante. El tabaquismo es un factor de riesgo conocido por causar diversos problemas de salud y se ha asociado con el DLC, pero la relación específica entre el tabaquismo y el DLC aún no ha sido bien explorada. Objetivo Este estudio tiene como objetivo investigar la asociación entre el tabaquismo y el DLC en estudiantes de medicina en Irak. Diseño Se empleó un diseño descriptivo transversal que involucró entrevistas cara a cara con 200 estudiantes de medicina de 18 años o más. Los datos sobre características demográficas, comport
... Show MoreMobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,
... Show MoreIn this paper, a new method of selection variables is presented to select some essential variables from large datasets. The new model is a modified version of the Elastic Net model. The modified Elastic Net variable selection model has been summarized in an algorithm. It is applied for Leukemia dataset that has 3051 variables (genes) and 72 samples. In reality, working with this kind of dataset is not accessible due to its large size. The modified model is compared to some standard variable selection methods. Perfect classification is achieved by applying the modified Elastic Net model because it has the best performance. All the calculations that have been done for this paper are in
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More