In the current study, 2D seismic data in west An-Najaf (WN-36 line) were received after many steps of processing by Oil Exploration Company in 2018. Surface Consistent Amplitude Compensation (SCAC) was applied on the seismic data. The processing sequence in our study started by sorting data in a common mid-point (CMP) gather, in order to apply the velocity analysis using Interactive Velocity Analysis Application (INVA) with Omega system. Semblance of velocity was prepared to preform normal move-out (NMO) vs. Time. Accurate root mean square velocity (VRMS) was selected, which was controlled by flatness of the primary events. The resultant seismic velocity section for the study area shows that the velocity analysis became smother and provided an accurate seismic section.
The field experiment was conducted with the aim of developing and testing an automatic sprayer for agricultural spray experiments and studying the effect of spray pressure, spray speed and spray height on the spraying process. The effects of the major spraying factors (pressure, speed, and height) on the spraying performance of the automatic sprayer were studied. This study included several traits: First - the drop sizes - Second - the penetration of the spray into the vegetation cover - Third, the spray wasted. The results showed: - First: - Increase in coverage percentage when using the first speed, 2 km / h, which amounted to 26.85%. An increment in the spraying penetration of the vegetation cover was observed at the second speed
... Show MoreBackground: The study was designed to evaluate the effect of local application of exogenous VEGF/collagen I separately and as a combination in socket healing. Sixty male Albino Wistar rats were subjected for a surgical tooth extraction of upper 1st molar of both sides (right side was considered as experimental site, while left be the control one, treated with 1µL of normal saline). The rats were scarified at 3, 7, 14, 28 days post extraction. Socket healing was histologically examined with immunohistochemistochemical localization of ALP&FGF2. Materials and Method: Sixty male Albino Wistar rats were subjected for a surgical tooth extraction of upper 1stmolar of both sides (right side was considered as experimental site, while left be the
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreRNA Sequencing (RNA-Seq) is the sequencing and analysis of transcriptomes. The main purpose of RNA-Seq analysis is to find out the presence and quantity of RNA in an experimental sample under a specific condition. Essentially, RNA raw sequence data was massive. It can be as big as hundreds of Gigabytes (GB). This massive data always makes the processing time become longer and take several days. A multicore processor can speed up a program by separating the tasks and running the tasks’ errands concurrently. Hence, a multicore processor will be a suitable choice to overcome this problem. Therefore, this study aims to use an Intel multicore processor to improve the RNA-Seq speed and analyze RNA-Seq analysis's performance with a multiproce
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreObjectives: To assess the qualifications and performance of newly graduated pharmacists and explore factors that affect their performance in public hospitals. Methods: This qualitative study included face-to-face, semi-structured interviews with hospital practitioner pharmacists. It was conducted between March and May 2023 in Kerbala province, Iraq. The participating pharmacists were selected purposefully because they had three or more years of work experience at governmental hospitals. The audio-recording interviews were transcribed. Thematic analyses were used to generate themes and subthemes from the interviews. Results: Twenty-seven hospital pharmacists participated in this study. The study found that there are several factors t
... Show MoreObjective: To assess the nutritional status of hemodialysis patients.
Methodology: A descriptive quantitative cross sectional study was effectuated in hemodialysis centers from
February 2011 to September 2011. A purposive "non-probability" sample of (70) male and female hemodialysis
patients in al-Najaf al-Ashraf Governorate from those who have spent more than six months on maintenance
hemodialysis schedule. Data collected through using of a well-designed questionnaire consist of five parts, part
one consists of sociodemographic contain (9) items, and part two consists of medical data contain (8) items, and
part three consists of health and nutrition behavior contain (12) items plus (8) items of anthropometric
measur