An integrated lithofacies and mineralogical assemblage was used to describe a depositional model and sequence stratigraphic framework of the Maastrichtian–Danian succession in the Western Desert of Iraq and eastern Jordan. Fifteen lithofacies types were grouped into three associations recognized in a distally steepened ramp characterized by an apparent, distinct increase in a gradient paleobathymetric deepening westward. The clay and nonclay minerals are dominated by smectite and palygorskite, with trace amounts of kaolinite, sepiolite, illite and chlorite. Meanwhile, quartz, calcite, dolomite, opal CT (Cristobalite - Tridymite), and apatite are the main nonclay minerals. The widely dominated smectite in the Western Phosphatic Basin of Iraq (WPB) refers to warm, subhumid climates and low topographic relief in the source area, which increased significantly with transgressive cycles. In contrast, the palygorskite was generated under seasonal semiarid/arid climates associated dominantly with regressive cycles. Five sequence boundaries are documented in the present study according to hiatus, erosional surfaces, Thalassinioides burrows, reworked fauna, and extensively bored hardground. These sequence boundaries separate the studied sequences into four third-order depositional sequences correlated to their regional and global counterparts. The combined effects of the local tectonic activity of the Rutbah High and sea- level drops are amalgamated inside the Western Desert of Iraq and eastern Jordan because of a long-time gap, particularly across the Cretaceous/Paleogene (K/Pg) and Danian/Selandian (Da/Se) transitions
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreThis study examines traveling wave solutions of the SIS epidemic model with nonlocal dispersion and delay. The research shows that a key factor in determining whether traveling waves exist is the basic reproduction number R0. In particular, the system permits nontrivial traveling wave solutions for σ≥σ∗ for R0>1, whereas there are no such solutions for σ<σ∗. This is because there is a minimal wave speed σ∗>0. On the other hand, there are no traveling wave solutions when R0≤1. In conclusion, we provide several numerical simulations that illustrate the existence of TWS.
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreAllowing Iraqi companies to use multiple systems and policies leads to varying levels of disclosure and no high symmetry between report preparers and users, and that the adoption of integrated reporting can reduce information asymmetry. The theoretical side addressed the concepts of these variables, and in the practical side the binary variable (0, 1) was used. To compensate for the value of the independent variable (integrated reporting) based on the Central Bank of Iraq’s classification of banks according to the (CAMLES) index, and the dependent variable (information asymmetry) was measured through two measures (price difference, unusual return), the research community was represented by (5) Banks out of the total of banks li
... Show MoreAs long as Islamic banks cannot operate in an environment that deals with traditional banking instruments based on the interest rate (bank interest) that is prohibited by Article No. (6) of the Islamic Banking Law No. (43) of 2015 which stipulates that (do not deal in any activity that carries Interest (neither taking nor giving)). Therefore it seeks to provide an alternative strategic solution within the framework of the provisions and rules of Islamic Sharia, on the basis of participating in profit and loss to avoid the method of interest taking and giving, to find investment methods to provide new financial products, such as Islamic certificates of deposit and investment funds according to the method Murabaha, speculation (Mudar
... Show MoreThe Interests of British Military in Iraq was not based upon unified vision for the Iraqi identity ,it worked on breaking that identity and deal with the different ethnic and religious minorities and tried to bring it to its side and use it and its figures in the governmental position ,the aim was to make these minorities and here to the Britain to achieve its purposes and strategies in Iraq also vowed to provoked discord social conflicts between the components of Iraqi society.
However , the British military administration depended the portioning and deepen the cracks by depending on ethnic as well as religious minorities to achieve its plans in the future and plays on the string of these minorities under the pretext of defending it
The present study conducted to study epipelic algae in the Tigris River within Baghdad city for one year from September 2011 to August 2012 due to the importance role of benthic algae in lotic ecosystems. Five sites have been chosen along the river. A total of 154 species of epipelic algae was recorded belongs to 45 genera, where Bacillariophyceae (Diatoms) was the dominant groups followed by Cyanophyceae and Chlorophyceae. The numbers of common types in three sites were 47 species. Bacillariophyceae accounted 88.31% of the total number of epipelic algae, followed by Cyanophyceae 7.14 % and Chlorophyceae 4.55%. A 85 species (29 genera) recorded in site 1, 103 species (34 genera) in site2, 112 species (35 genera) in site3, 96 species
... Show MoreBackground: Candida tropicalis is one of the most causes of vulvovaginal candidiasis (VVC) in women. Systemic candidiasis and candidemia may also occur in pregnancies. Objective: This study was carried out to detect and isolate of this yeast from aborted placenta, which may cause severe complications such as spontaneous abortion. Materials and methods: Fresh aborted placenta were collected and washed by normal saline to remove the blood. Then, cut it into portions and place it in test tube containing 5 ml of normal saline. Finally, shake for 10 minutes, after that, cultured for microbial isolation. Isolation and detection were done by some conventional methods with Api candida and CHROMagar. Results: The results showed that four iso
... Show More