Pulkhana anticline is located in Tuzhurmatu area, about 50 km SE of Kirkuk city. The study area forms a part of the Zagros Folded Zone which is situated in the unstable shelf of Iraq within the physiographic zone called Foothill Zone (in the middle of Hemrin- Makhul subzone). The north eastern limb of the anticline reaches to 50ᵒ and the dip of the south western limb reaches to 70ᵒ. The core of the structure comprises the rocks of Fat’ha Formation surrounded by rocks of Injana and Mukdadiya Formations, whereas Bai-Hasan Formation forms the slopes of the low hills surrounding the anticline. These Formations range in age from Middle Miocene to Pliocene. More than 761 readings of joint planes were collected from 20 stations within 5 traverses in the study area. The study of joint sets and system was within Injana and Mukhdadiya formations, along traverses with 3-5 stations for each travers track. The results showed the presence of two sets of tension joints (bc, ac) and five sets of shear joints, through defining the maximum stress axis (σ1) and acute angle dividers for these conjugate joints. It was determined that two directions of Paleostress are present in the area, which are NE-SW and NW-SE. The direction of the first major stress (NE-SW) is orthogonal with, or normal to, the fold axis in the study area, which can be considered as a horizontal component which resulted from oblique collision of Arabian and Eurasian Plates. This old compressive stress is the reason behind the formation of the tension joint (ac) and shear joints, where the sets (ac) and system are perpendicular-semi perpendicular to the bedding plane, as they were formed at an early stage of folding. Also, the ) joint was formed in five tectonic stages with different time intervals. Joints formed in different tectonic stages, in the study area, are attributed to oblique collision of Arabian and Eurasian plates and counter clockwise rotation of Arabian plate relative to Eruasian plate.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Our research comes to shed light on Iraqi literature as literature that arose in special circumstances alongside foreign literature. Using comparative research methods, we chose to highlight two distinguished writers, who have their mark in the world of literature. The first is the Iraqi writer Maysaloun Hadi, who is considered an icon of Iraqi feminist literature, and the second is the French writer Le Clézieu, who won the Nobel in 2008. We will see through the research how the two authors expressed their views of modernity and urbanism. And how each of them separately portrayed the psychological and moral projections that formed the essence of man today.
Résumé
Notre recherche abord un des points inc
... Show MoreMultipole mixing ratios for gamma transition populated in from reaction have been studied by least square fitting method also transition strength ] for pure gamma transitions have been calculated taking into account the mean life time for these levels .
The reaction of 2-amino-benzothiazole with bis [O,O-2,3,O,O – 5,6 – (chloro(carboxylic) methiylidene) ] – L – ascorbic acid (L-AsCl2) gave new product 3-(Benzo[d]Thaizole-2-Yl) – 9-Oxo-6,7,7a,9-Tertrahydro-2H-2,10:4,7-Diepoxyfuro [3,2-f][1,5,3] Dioxazonine – 2,4 (3H) – Dicarboxylic Acid, Hydro-chloride (L-as-am)), which has been insulated and identified by (C, H, N) elemental microanalysis (Ft-IR),(U.v–vis), mass spectroscopy and H-NMR techniques. The (L-as am) ligand complexes were obtained by the reaction of (L-as-am) with [M(II) = Co,Ni,Cu, and Zn] metal ions. The synthesized complexes are characterized by Uv–Visible (Ft –IR), mass spectroscopy molar ratio, molar conductivity, and Magnetic susceptibility techniques. (
... Show MoreThe reaction of LAs-Cl8 : [ (2,2- (1-(3,4-bis(carboxylicdichloromethoxy)-5-oxo-2,5dihydrofuran-2-yl)ethane – 1,2-diyl)bis(2,2-dichloroacetic acid)]with sodium azide in ethanol with drops of distilled water has been investigated . The new product L-AZ :(3Z ,5Z,8Z)-2azido-8-[azido(3Z,5Z)-2-azido-2,6-bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H-1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide was isolated and characterized by elemental analysis (C.H.N) , 1H-NMR , Mass spectrum and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the L-AZ withM+n: [ ( VO(II) , Cr(III) ,Mn(II) , Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) and
... Show MoreAbstract: The M(II) complexes [M2(phen)2(L)(H2O)2Cl2] in (2:1:2 (M:L:phen) molar ratio, (where M(II) =Mn(II), Co(II), Cu(II), Ni(II) and Hg(II), phen = 1,10-phenanthroline; L = 2,2'-(1Z,1'Z)-(biphenyl-4,4'-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1- ylidene)diphenol] were synthesized. The mixed complexes have been prepared and characterized using 1H and13C NMR, UV/Visible, FTIR spectra methods and elemental microanalysis, as well as magnetic susceptibility and conductivity measurements. The metal complexes were tested in vitro against three types of pathogenic bacteria microorganisms: Staphylococcus aurous, Escherichia coli, Bacillussubtilis and Pseudomonasaeroginosa to assess their antimicrobial properties. From this study shows that a
... Show MoreBackground: The access cavity is a critical stage in root canal therapy and it may influence the subsequent steps of the treatment. The new minimally invasive endodontic access cavity preparation concept aims to preserve sound tooth structure by conserving as much intact dentine as possible including the pulp chamber's roof, to keep the teeth from fracturing during and after endodontic treatment. While there is great interest in such access opening designs in numerous publications, still there is a lack of scientific evidence to support the application of such modern access cavity designs in clinical practice. This review aims to critically examine the literature on minimal access cavity preparations, explain the effect of minimally inva
... Show MoreThe reaction of LAs-Cl8 : [ (2,2- (1-(3,4-bis(carboxylicdichloromethoxy)-5-oxo-2,5- dihydrofuran-2-yl)ethane – 1,2-diyl)bis(2,2-dichloroacetic acid)]with sodium azide in ethanol with drops of distilled water has been investigated . The new product L-AZ :(3Z ,5Z,8Z)-2- azido-8-[azido(3Z,5Z)-2-azido-2,6-bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5- triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H-1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide was isolated and characterized by elemental analysis (C.H.N) , 1H-NMR , Mass spectrum and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the L-AZ withM+n: [ ( VO(II) , Cr(III) ,Mn(II) , Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) and Hg(II)] has been i
... Show MoreBackground: Chronic obstructive pulmonary disease causes permanent morbidity, premature mortality and great burden to the healthcare system. Smoking is it's most common risk factor and Spirometry is for diagnosing COPD and monitoring its progression.
Objectives: Early detection of chronic obstructive pulmonary disease in symptomatic smokers’ ≥ 40years by spirometry.
Methods: A cross sectional study on all symptomatic smokers aged ≥ 40 years attending ten PHCCs in Baghdad Alkarkh and Alrisafa. Those whose FEV1/FVC was <70% on spirometry; after giving bronchodilator, were considered COPD +ve.
Results: Overall, airway obstruction was seen in
... Show MoreUsing the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result
... Show More