This study presents the determination of the paleostress magnitudes and orientation of Bekhme Structure in Shaqlawa area, northeastern Iraq. Paleostress analysis of slip-fault measurements is performed using Right dihedral, Lisle diagram, and Mohr Circles methods. Depending on Mohr Circles, Bott law, and vertical thickness, the magnitudes of the paleostress at the time of the tectonic activity were determined. Firstly, Georient Software was used to estimate the orientation of the paleostresses (σ1, σ2, and σ3). Secondly, using the rupture –friction law, taking into account the depth of the overburden and the vertical stress (σv),the magnitudes of the paleostresses were calculated (σ1=4500 bars, σ2=1900 bars and σ3=700 bars). The high magnitudes of the principal stress axes may be attributed to the active tectonic events which led to the deformation of the area during the Cretaceous and Tertiary periods. The study area shows that the poles of the measured faults lie in the reactivated area of Mohr circles. This indicates the instability of the study area. The study area is estimated to have high importance, due to the possibility of the existence of deposited hydrocarbons. Fold- Thrust belt marks the deformation fronts of the major orogeny that forms from the collision of the Arabian Plate with the Turkish and Iranian Plates.
The service quality of any information-based system could be evaluated by the high-end user in such a way that the system developer or responsible intently might use these user experiences to improve, develop and benchmark their system. In this paper, questionnaire implemented to rate to what extent the academic admission system as a web site achieves performance. Data were collected from 21 users of the system; all of them are highly educated and have the experience of using the site. Quadrant and gap analysis were implemented to evaluate the weakness and strength of the data. The major data analyses were performed on the data collected in terms of its importance and satisfaction to the users. A number of statistical tools have been uti
... Show MoreE-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas
... Show MoreThe study aims to build a water quality index that fits the Iraqi aquatic systems and reflects the environmental reality of Iraqi water. The developed Iraqi Water Quality Index (IQWQI) includes physical and chemical components. To build the IQWQI, Delphi method was used to communicate with local and global experts in water quality indices for their opinion regarding the best and most important parameter we can use in building the index and the established weight of each parameter. From the data obtained in this study, 70% were used for building the model and 30% for evaluating the model. Multiple scenarios were applied to the model inputs to study the effects of increasing parameters. The model was built 4 by 4 until it reached 17 parame
... Show MoreIn aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we
... Show MoreThe main objective of e-learning platforms is to offer a high quality instructing, training and educational services. This purpose would never be achieved without taking the students' motivation into consideration. Examining the voice, we can decide the emotional states of the learners after we apply the famous theory of psychologist SDT (Self Determination Theory). This article will investigate certain difficulties and challenges which face e-learner: the problem of leaving their courses and the student's isolation.
Utilizing Gussian blending model (GMM) so as to tackle and to solve the problems of classification, we can determine the learning abnormal status for e-learner. Our framework is going to increase the students’ moti
Recently personal recommender system has spread fast, because of its role in helping users to make their decision. Location-based recommender systems are one of these systems. These systems are working by sensing the location of the person and suggest the best services to him in his area. Unfortunately, these systems that depend on explicit user rating suffering from cold start and sparsity problems. The proposed system depends on the current user position to recommend a hotel to him, and on reviews analysis. The hybrid sentiment analyzer consists of supervised sentiment analyzer and the second stage is lexicon sentiment analyzer. This system has a contribute over the sentiment analyzer by extracting the aspects that users have been ment
... Show MoreThis research aims to choose the appropriate probability distribution to the reliability analysis for an item through collected data for operating and stoppage time of the case study.
Appropriate choice for .probability distribution is when the data look to be on or close the form fitting line for probability plot and test the data for goodness of fit .
Minitab’s 17 software was used for this purpose after arranging collected data and setting it in the the program.
&nb
... Show Moreهدفت الدراسة الى التعرف على مستوى استخدام إدارة المعرفة و تكنولوجيا المعلومات لدى القيادات الإدارية تُعدّ لعبة الإسكواش من الألعاب الفردية، وواحدة من ألعاب المضرب، والتي تمتاز بالسرعة والحركة الدائمة في داخل القاعة، ولعل أهم ما يميز هذه اللعبة المتعة التي يشعر بها اللاعبون الممارسون لها، لأنها تجبر ممارسيها على الحركة المستمرة عن طريق تبادل لعب الكرة، وتتميز بالتحدي المباشر، وتتطلب اليقظة والحرص وال
... Show MoreTwitter popularity has increasingly grown in the last few years, influencing life’s social, political, and business aspects. People would leave their tweets on social media about an event, and simultaneously inquire to see other people's experiences and whether they had a positive/negative opinion about that event. Sentiment Analysis can be used to obtain this categorization. Product reviews, events, and other topics from all users that comprise unstructured text comments are gathered and categorized as good, harmful, or neutral using sentiment analysis. Such issues are called polarity classifications. This study aims to use Twitter data about OK cuisine reviews obtained from the Amazon website and compare the effectiveness
... Show MoreIn multivariate survival analysis, estimating the multivariate distribution functions and then measuring the association between survival times are of great interest. Copula functions, such as Archimedean Copulas, are commonly used to estimate the unknown bivariate distributions based on known marginal functions. In this paper the feasibility of using the idea of local dependence to identify the most efficient copula model, which is used to construct a bivariate Weibull distribution for bivariate Survival times, among some Archimedean copulas is explored. Furthermore, to evaluate the efficiency of the proposed procedure, a simulation study is implemented. It is shown that this approach is useful for practical situations and applicable fo
... Show More