Preferred Language
Articles
/
bsj-1334
Land Magnetic survey along a profile from Akaz to Rutba town and its applications
...Show More Authors

A land magnetic survey was carried out along regional profile, which is located at the north part of the Iraqi western desert. It starts from al –Qaam City (at north) toward Rutba City (at south) with a total length of 238km. The survey was carried out along the paved road between the two cities, About 113 measuring points were done with inter-station distance of 2 km (for 198 km) and 2 to 5km (for 40km). Two proton magnetometers were used in this survey. One of them is used for base station monitoring, which was fixed as of Salah Aldin field (Akkas). Its readings were used for diurnal corrections. All magnetic measurements were corrected for normal and topographic corrections. The readings were reduced to a certain base level. The resulted magnetic anomalies show a good correlation with those of Arial - magnetic survey anomalies conducted by (C.G.G, 1974). This is true for those anomalies with wavelength more than 50km. While the land magnetic survey has shown more small anomalies which may reflect near surface sources. In addition, there is a considerable difference between the magnetic intensity values of both surveys. The downward continuation method was used in this study for detecting the depth of magnetic anomaly source. But before applying this method the total magnetic field was converted to its vertical component using computer program packages. The 2.5 mathematical modeling techniques were used for interpreting magnetic anomaly. Several models were suggested according to the geological and geophysical surface and subsurface data. These models clearly suggest that the tectonic of the studied area may be completely affected by deep faults that could reach the basements or even cut it. These faults resulted in tectonic blocks with relative movements that could happen through the geological time, and they may be responsible for the tectonic features of the western desert. These faults could also responsible for the lateral and vertical variations that are noticed in subsurface rocks of the studied area. The subsurface lateral susceptibility variation between the different blocks could result from the variation in physical parameter of the rocks (like porosity, fracture density…) and there is a possibility that rocks beneath 18km (lower crust) still possess some magnetic properties.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 28 2022
Journal Name
Structural Chemistry
Sensitivity of SnO2 nanoparticles/reduced graphene oxide hybrid to NO2 gas: A DFT study
...Show More Authors
Abstract<p>The sensitivity of SnO<sub>2</sub> nanoparticles/reduced graphene oxide hybrid to NO<sub>2</sub> gas is discussed in the present work using density functional theory (DFT). The SnO<sub>2</sub> nanoparticles shapes are taken as pyramids, as proved by experiments. The reduced graphene oxide (rGO) edges have oxygen or oxygen-containing functional groups. However, the upper and lower surfaces of rGO are clean, as expected from the oxide reduction procedure. Results show that SnO<sub>2</sub> particles are connected at the edges of rGO, making a p-n heterojunction with a reduced agglomeration of SnO2 particles and high gas sensitivity. The DFT results are in</p> ... Show More
View Publication
Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Oxidative status among a group of pregnant women in relation to gingival health condition
...Show More Authors

Background: pregnancy as a systemic condition causes changes in the functioning of human body as a whole and specifically in the oral cavity and it also is considered as a stressful condition. These changes may favor the increase of oxidative stress. Aim: The aim of this study was to estimate the level of marker of oxidative stress (malondialdehyde) and antioxidant (uric acid) in saliva of pregnant compared to non-pregnant women and to assess the gingival health condition in both groups. Additionally, unstimulated salivary flow rate was determined in both groups. Subjects, materials and methods: The study group consisted of sixty pregnant women, they were divided into three equal groups according to trimester (20 pregnant women for each

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Mon Sep 12 2022
Journal Name
Electronics
TWGH: A Tripartite Whale–Gray Wolf–Harmony Algorithm to Minimize Combinatorial Test Suite Problem
...Show More Authors

Today’s academics have a major hurdle in solving combinatorial problems in the actual world. It is nevertheless possible to use optimization techniques to find, design, and solve a genuine optimal solution to a particular problem, despite the limitations of the applied approach. A surge in interest in population-based optimization methodologies has spawned a plethora of new and improved approaches to a wide range of engineering problems. Optimizing test suites is a combinatorial testing challenge that has been demonstrated to be an extremely difficult combinatorial optimization limitation of the research. The authors have proposed an almost infallible method for selecting combinatorial test cases. It uses a hybrid whale–gray wol

... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Effect Of Technology Based Learning As A Supplement To Traditional Technology On Student's Achievement
...Show More Authors

This paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Engineering, Technology &amp; Applied Science Research
Numerical Modeling of a Pile Group Subjected to Seismic Loading Using the Hypoplasticity Model
...Show More Authors

Various simple and complicated models have been utilized to simulate the stress-strain behavior of the soil. These models are used in Finite Element Modeling (FEM) for geotechnical engineering applications and analysis of dynamic soil-structure interaction problems. These models either can't adequately describe some features, such as the strain-softening of dense sand, or they require several parameters that are difficult to gather by conventional laboratory testing. Furthermore, soils are not completely linearly elastic and perfectly plastic for the whole range of loads. Soil behavior is quite difficult to comprehend and exhibits a variety of behaviors under various circumstances. As a result, a more realistic constitutive model is

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Annales Pharmaceutiques Françaises
Adopting video assignments as a tool to improve first-year pharmacy students class engagement
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Thu Nov 01 2012
Journal Name
Ijcsi International Journal Of Computer Science
Implementing a novel approach an convert audio compression to text coding via hybrid technique
...Show More Authors

Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 08 2021
Journal Name
Turkish Online Journal Of Qualitative Inquiry (tojqi)
Civil Protection of Rights contiguous to Author’s Royalty in Iraqi Law A comparative study
...Show More Authors

Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref