Tau-P linear noise attenuation filter (TPLNA) was applied on the 3D seismic data of Al-Samawah area south west of Iraq with the aim of attenuating linear noise. TPLNA transforms the data from time domain to tau-p domain in order to increase signal to noise ratio. Applying TPLNA produced very good results considering the 3D data that usually have a large amount of linear noise from different sources and in different azimuths and directions. This processing is very important in later interpretation due to the fact that the signal was covered by different kinds of noise in which the linear noise take a large part.
Heavy metal contamination comprises a great concern in the environment. A magnetic study combined with heavy metal analyses was performed in the Sawa Lake in Al-Muthanna governorate (southern Iraq). Concentrations of selected heavy metals (Cr, Fe, Ni, As and Pb) have been measured and magnetic susceptibility (χ) of sediment samples collected from the lake bottom was calculated.
The results confirmed that a cement plant, which is located less than two kilometers away from the lake has no contamination levels on the lake’s sediments. No enhancement in the magnetic susceptibility was observed. X-ray florescence (XRF) was performed for heavy metal analyses.
Spatial variations of χ with the mean value of 4.58 x
... Show MoreIn this search, a new bioluminescent technique was proved for pyrophosphate which was employed to single- nucleotide polymorphism (SNP) diagnosis using one-base extension reaction. Four Mycobacterium tuberculosis genes were chosen (Rpob, InhA, KatG, GyrA) genes. Fifty-four specimens were used in this study fifty-three proved as drug-resistant specimens by The Iraqi Institute of Chest and Respiratory Diseases in Baghdad., also one specimen was used as a negative control. The procedure of this assay was as follows. A specific primer within each aliquot owning a short 3-OH end of the base of the target gene was hybridized to the single-stranded DNA template. Then, (exo-) Klenow DNA polymerase and one of either ?-thio-dATP, dTTP, dGTP, or dCTP
... Show MoreKarbala province was one of the most important areas in Iraq and considered an
economic resource of vegetation such as trees of fruits, sieve and other vegetation.
This research aimed to utilize change detection for investigating the current
vegetation cover at last three decay. The main objectives of this research are collect
a group of studied area (Karbala province) satellite images in sequence time for
the same area, these image captured by Landsat (TM 1995, ETM+ 2005 and
Landsat 8 OLI (Operational Land Imager) 2015. Preprocessing such as atmosphere
correction and rectification has been done. Mosaic model between the parts of
studied area was performing. Gap filling consider being very important step has
be
Urban design and human activity are main causes of environmental pollution and climate change, such as reliance on energy production plants, factories and transportation that depend on fossil fuels, in addition to transformation of most green areas into residential areas. This paper aims to establish a sustainable city with an environment friendly urban design that contributes to exploitation of natural resources in the generation of electric power, use of green means of transport and thus the reduction of pollution. Anah site was chosen as the best site for designing a sustainable city, with its natural resources, air quality and moderate climate. The total area of the city is 9990187m2 divided into s
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached seve
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreCloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag
... Show MoreThis review explores the Knowledge Discovery Database (KDD) approach, which supports the bioinformatics domain to progress efficiently, and illustrate their relationship with data mining. Thus, it is important to extract advantages of Data Mining (DM) strategy management such as effectively stressing its role in cost control, which is the principle of competitive intelligence, and the role of it in information management. As well as, its ability to discover hidden knowledge. However, there are many challenges such as inaccurate, hand-written data, and analyzing a large amount of variant information for extracting useful knowledge by using DM strategies. These strategies are successfully applied in several applications as data wa
... Show More