Three formations to be studied along Surdash, Qallat, Khalakan, Hezob, Sektan, Degala
and Shaqlawa areas in the Sulaimaniya and Erbil governorates, NE Iraq. These are: Dokan,
Gulneri and Kometan formations. The paleoecology and depositional environment of these
formations are determined by studying the ecology of the planktonic and benthic
foraminifera.
The depositional environment of are ranged from the continental shelf to the abyssal,
and the paleotemperature, salinity and paleoclimate were discriminated in each section
along the study area.
The study area is located to the south of Iraq at Al-Shanafiya town, south west of Iraq. Groundwater is the main source for crops irrigation, household uses and livestock drinking. To determine the relative age of groundwater by measuring the tritium concentration in groundwater, four wells and four springs water samples were taken. Found that the mean tritium concentration in springs samples is 4.125 TU where in wells samples is 2 TU. Using Clark and Firtz (1997) classification found that the relative age is amix of sub modern and modern water. Through modern study was performed by Al-Paruany (2013) found that the tritium concentration in rainfall in Al-Diwaniyah Meteoric Station has reached the natural level (approximately 5TU). Throug
... Show MoreThe granitoid bodies in the Shalair Valley are structurally located within so-called Iraqi Zagros Suture Zone, in the northeastern Iraq. One hundred and sixty-two representative samples were collected from five granitoid intrusive bodies in the valley: Aulan and Siristan in the northern part, Mishao and Laladar in the southern part and Demamna in the western part. Two major types of granitoids in the eastern and western part of the Shalair Valley area were indentified. The granitoids from the four locations in the eastern part, have similar mineral constitutes. These rocks are composed of plagioclase + quartz ± hornblende with two types of texture, equigranular texture represented by Aulan and Siristan in the northern part and porphyrit
... Show MoreHuman skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreRegarding the security of computer systems, the intrusion detection systems (IDSs) are essential components for the detection of attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in real time. A major drawback of the IDS is their inability to provide adequate sensitivity and accuracy, coupled with their failure in processing enormous data. The issue of classification time is greatly reduced with the IDS through feature selection. In this paper, a new feature selection algorithm based on Firefly Algorithm (FA) is proposed. In addition, the naïve bayesian classifier is used to discriminate attack behaviour from normal behaviour in the network tra
... Show MoreThe aim of this research is to adopt a close range photogrammetric approach to evaluate the pavement surface condition, and compare the results with visual measurements. This research is carried out on the road of Baghdad University campus in AL-Jaderiyiah for evaluating the scaling, surface texture for Portland cement concrete and rutting, surface texture for asphalt concrete pavement. Eighty five stereo images of pavement distresses were captured perpendicular to the surface using a DSLR camera. Photogrammetric process was carried out by using ERDAS IMAGINE V.8.4. The results were modeled by using a relationship between the photogrammetric and visual techniques and selected the highest coefficient of determination (R2). The first techniqu
... Show More