This research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-SW. This fault is mentioned by previous studies as undefined subsurface fault depth within the sedimentary cover rocks. The results of this research that were obtained by gravity quantitative interpretation find that the depth to this major fault plane center is about 2.4 Km.
Background: Beta thalassemia major is an inherited disorder that may affect general and oral health.The purpose of this study was toassess the severity of dental caries in relation to oral cleanliness, mutans streptococciamong a group of boys with beta thalassemia majorin comparison with a control group. Materials and Methods: The study involved 30 boys with BTM aged 10-12 years compared to 30 healthy boys with the same age group. d1-4mfs and D1-4 MFS indices were applied (Muhlemann, 1976), the viable counts of mutans streptococci in stimulated saliva were also determined. Results: The entire thalassemic group was caries-active. For both dentitions, a higher dmfs/DMFS values were recorded for study compared to control group, difference was
... Show MoreThis study was conducted on a sample of commercial banks in Iraq, chosen according number of considerations for twenty banks, contained two public banks and eighteen private banks. &
... Show MoreWell integrity is a vital feature that should be upheld into the lifespan of the well, and one constituent of which casing, necessity to be capable to endure all the interior and outside loads. The casing, through its two basic essentials: casing design and casing depth adjustment, are fundamental to a unique wellbore that plays an important role in well integrity. Casing set depths are determined based on fracturing pressure and pore pressure in the well and can usually be obtained from well-specific information. Based on the analyzes using the improved techniques in this study, the following special proposition can be projected: The selection of the first class and materials must be done correctly and accurately in accordance with the
... Show MorePhotoacoustic is a unique imaging method that combines the absorption contrast of light or radio frequency waves with ultrasound resolution. When the deposition of this energy is sufficiently short, a thermo-elastic expansion takes place whereby acoustic waves are generated. These waves can be recorded and stored to construct an image. This work presents experimental procedure of laser photoacoustic two dimensional imaging to detect tumor embedded within normal tissue. The experimental work is accomplished using phantoms that are sandwiched from fish heart or blood sac (simulating a tumor) 1-14mm mean diameter embedded within chicken breast to simulate a real tissue. Nd: YAG laser of 1.064μm and 532nm wavelengths, 10ns pulse duration, 4
... Show MoreThe problem lies in the main research Where the site of this interpretation of the books of interpretation and what is new and how?
The objectives of this research Vjat to give a quick overview of Sheikh Kenon and the qualifications that made him interpreter, as the goal of the research to reveal the method of Sheikh Kenon highlighting what he has and what is new and show.
The researcher used the inductive method to read the whole book and the comparative approach to compare it with others. He also used the critical method to distinguish between the positions of strength and weakness in the book. The most important results are as follows: :
1 - Sheikh Abdullah Kenon language writer familiar with many sciences, such as jurisprude
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreExtension of bandwidth for high reflectance zone for the spectral region (8-14pm) was studied adapting the concept of contiguous and overlapping high reflectance stacks. Computations was carried out using the modified characteristic matrix theory restricted to near-normal incidence of light on dielectric , homogenous and isotropic symmetrical stack. Certain precautions must be taken in the choice of stacks to avoid deep —reflectance minima from developing within the extended high reflectance region. Results illustrate that the techniques of extending the high reflectance regions are applicable not only to mirrors , but also to short-and long-edge filter and to narrow band pass filters.
Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show More