Preferred Language
Articles
/
bsj-1334
Land Magnetic survey along a profile from Akaz to Rutba town and its applications
...Show More Authors

A land magnetic survey was carried out along regional profile, which is located at the north part of the Iraqi western desert. It starts from al –Qaam City (at north) toward Rutba City (at south) with a total length of 238km. The survey was carried out along the paved road between the two cities, About 113 measuring points were done with inter-station distance of 2 km (for 198 km) and 2 to 5km (for 40km). Two proton magnetometers were used in this survey. One of them is used for base station monitoring, which was fixed as of Salah Aldin field (Akkas). Its readings were used for diurnal corrections. All magnetic measurements were corrected for normal and topographic corrections. The readings were reduced to a certain base level. The resulted magnetic anomalies show a good correlation with those of Arial - magnetic survey anomalies conducted by (C.G.G, 1974). This is true for those anomalies with wavelength more than 50km. While the land magnetic survey has shown more small anomalies which may reflect near surface sources. In addition, there is a considerable difference between the magnetic intensity values of both surveys. The downward continuation method was used in this study for detecting the depth of magnetic anomaly source. But before applying this method the total magnetic field was converted to its vertical component using computer program packages. The 2.5 mathematical modeling techniques were used for interpreting magnetic anomaly. Several models were suggested according to the geological and geophysical surface and subsurface data. These models clearly suggest that the tectonic of the studied area may be completely affected by deep faults that could reach the basements or even cut it. These faults resulted in tectonic blocks with relative movements that could happen through the geological time, and they may be responsible for the tectonic features of the western desert. These faults could also responsible for the lateral and vertical variations that are noticed in subsurface rocks of the studied area. The subsurface lateral susceptibility variation between the different blocks could result from the variation in physical parameter of the rocks (like porosity, fracture density…) and there is a possibility that rocks beneath 18km (lower crust) still possess some magnetic properties.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 08 2023
Journal Name
Pharmaceutical Sciences Asia
Sub-inhibitory doses of Ofloxacin reduce adhesion and biofilm formation of Pseudomonas aeruginosa to biotic and abiotic surfaces
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Principles of war and jihad to protect the environment and civilians in times of war in Islamic Sharia
...Show More Authors

Research summary

Islam protects the environment and civilians in peace and war, and in international humanitarian law protection of the environment and civilians in international conflicts only. As for wars and internal conflicts, it is not within the jurisdiction of international humanitarian law. In Islamic law, the principles of protecting the environment and civilians are fixed in all wars and conflicts, whether internal or external, local. or international.

Islam laid down moral principles in war, including:

- Preserving the environment and avoiding corruption in the land by burning trees and killing animals unnecessarily.

- Not to be exposed to non-combatants, including women, boys, the elderly, the disa

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
Principles of war and jihad to protect the environment and civilians in times of war in Islamic Sharia
...Show More Authors

The use of destructive weapons in wars without restrictions and controls, which eat green and dry land, pollute the environment and cause genocide, has become the problem of the times.

International conventions for the protection of the environment during armed conflicts are characterized by generality, ambiguity, and open to interpretation by the participating states in the agreement, and each state interprets these texts to serve its interests, but the Islamic Sharia stipulates the prohibition of the use of these comprehensive destructive weapons in an unambiguous manner, As stated in the Holy Quran:

                

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Analysis of the Chemistry Book second grade intermediate according to science and technology, society and Environment issues (S.T.S.E)
...Show More Authors

The aim of the present research is to know the following : What are the Science and technology, society and environment issues (S.T.S.E) which included in the content of thechemistry Book second grade intermediate ? And to achieve the objective of search The two researchers has prepares a list of science and technology, society and environment issues (STSE) consisted of (9) key issues namely (Air quality and the atmosphere, sustainable development, water security, health and preventive security, mineral resources investment, pollution of various kinds, energy, food industry, production of weapons technology) and from which (70) sub-issues emerge,Arbitrators competent agreement has been received . Then, thetwo researchers analyzed the con

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 10 2025
Journal Name
Retos
The effect of the strategy to nominate ideas on divided and selective attention and perform some volleyball skills
...Show More Authors

Introduction: Attention is a fundamental cognitive function in sports, particularly in volleyball, where players must process multiple stimuli and make rapid decisions. Effective attentional control can enhance an athlete’s ability to react to dynamic game situations. The nomination of ideas strategy. Objective: This study aims to examine the effectiveness of the nomination of ideas strategy in enhancing divided and selective attention and its subsequent impact on volleyball skill performance. Methodology: A controlled experimental design was employed, involving volleyball players divided into an experimental group and a control group. The experimental group integrated the nomination of ideas strategy into their training sessions,

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Public Budget and the Roles of Legislative and Executive Power Regarding It with Reference to Iraq)2004-2011)
...Show More Authors

The public budget is regarded a main tool for economic and social development. The preparation of the public budget constitute an important stream which enriches the developmental efforts and the definition of its priorities, therefore it is the focus point of many specializations. The public budget has numerous functions. It is a means to precise and to execute the political and economic goals of the executive authority, a mirror of the economic structure which reflects its strength and weakness points, specifies its revenues and others. Since the parliament is the voice of the society which expresses its interests, then, it must monitor the performance of the government so that the participation of the legislative authority in

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Colonization and Civilization in Aimé Cesaire’s A Tempest
...Show More Authors

This study deals with the concepts of Colonialism and Civilization in Aimé Cesaire’s A Tempest. The concern of this study is to discuss how postcolonial writers are continually re-writing the Western canonical works as a reaction to the European cultural hegemony. The Western representations of the black are products of specific moments and developments in history and culture. A Tempest reflects a certain historical moment in the decolonization process.

A Tempest is analysed to reveal the counter literary strategy used by Aimé Cesaire, and to disclose the reasons why re-writing and writing back are considered as vital and inescapable tasks. Shakespeare’s The Tempest, which deals with the

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Vein Biometric Recognition Methods and Systems: A Review
...Show More Authors

View Publication
Scopus (14)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review
...Show More Authors

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (2)
Scopus Crossref