Preferred Language
Articles
/
ijs-5399
The Jurassic and Deep Structures Inferred from Gravity Data Depending on Stripping Technique for The Uppermost Layers in Central and Southern Iraq
...Show More Authors

      The gravity anomalies of the Jurassic and deep structures were obtained by stripping the gravity effect of Cretaceous and Tertiary formations from the available Bouguer gravity map in central and south Iraq. The gravity effect of the stripped layers was determined depending on the density log or the density density obtained from the sonic log. The density relation with the seismic velocity of Gardner et al (1974) was used to obtain density from sonic logs in case of a lack of density log. The average density of the Cretaceous and Tertiary formation were determined then the density contrast of these formations was obtained. The density contrast and thickness of all stratigraphic formations in the area between the sea level to the top of Jurassic formations were used to determine the gravity effect of these layers. The gravity anomaly map of the stripped formation was determined. The gravity anomaly map of the stripped formation was subtracted from the Bouguer gravity map, and the gravity anomaly map of deep structures was obtained. The regional and residual maps (3rd order polynomial ) were determined  for the gravity anomaly maps before and after stripping. The regional gravity map before stripping shows one positive anomaly located at the western part of the study area and west Abu-Jir and Euphrates faults. The regional gravity map after stripping shows a positive anomaly located along an axis extended from Kut toward Najaf. This positive anomaly map divided the sedimentary basin into two sub-basins. The positive gravity residual anomaly of the Bouguer map before stripping shows regionally three structural axes trending NW-SE. These axes are Baghdad-Kut axis, northwest Karbala axis and west Samawa- Nasiriyah axis. The positive residual anomaly map after stripping shows two important  anomaly areas. The first area is located between Kut and Karbala-Najaf . and the second is located northwest Karbala by about 100-120 km. These two areas may be prospective areas for hydrocarbon. The stripping method application in the study area shows good result; therefor, it can be used to enhance the gravity data to investigate deep structures in other areas.   

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Paleoenvironmental conditions during deposition of Kolosh and Gercus formations in northern Iraq as deduced from clay mineral distributions
...Show More Authors

     A mineralogical study using X-ray diffraction supported by scanning electron microscopic examination on the Paleocene- Eocene Kolosh and Gercus formations from northern Iraq is conducted to show the distribution of clay minerals and their paleoenvironmental implications. Smectite palygorskite, kaolinite, illite, and chlorite are commonly present in varying proportions within the Kolosh and Gercus formations. Association of smectite and chlorite in the claystone of the Paleocene Kolosh Formation refers to marine environment of this formation, whereas development of palygorskite fibers from smectite precursor may relate to post-depositional diagenesis. In addition, the abundance of illite and kaolinite in the Eocen

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Facies, Depositional Environment and Cyclicity of the Fatha Formation in East Baghdad Oil Field, Iraq.
...Show More Authors

This study deals with establishing the depositional environment of the Fatha Formation through facies analysis. It also deals with dividing the formation into units based on the rhythmic nature. Data from selected shallow wells near Hit area and deep wells at East Baghdad Oil field are used. Five major lithofacies are recognized in this study, namely, greenish grey marl, limestone, gypsum (and/or anhydrite), halite and reddish brown mudstone (with occasional sandstone).The limestone lithofacies is divided into three microfacies: Gastropods bioclastic wackestone microfacies, Gastropods peloidal bioclastic packstone, and Foraminiferal packstone microfacies.The lithofacies of the Fatha are nested in a rhythmic pattern or what is known as sh

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
The Association between Single Nucleotide Polymorphisms rs1042522 and rs1642785 in the TP53 gene and Acute Myeloid leukemia in a sample of the Baghdad/ Iraq population
...Show More Authors

Acute myeloid leukemia (AML) represents the most prevalent type of acute leukemia in adults and is responsible for approximately 80% of all cases. The tumor suppressor gene (TP53) is a gene that has been frequently studied in cancer, and mutations in this gene account for about 50% of human cancers. This study aims to evaluate the correlation between two single nucleotide polymorphisms (SNPs) in the gene: rs1042522 and rs1642785, and a group of Iraqi patients suffering from pre-diagnostic acute myeloid leukemia (AML). Blood samples were collected from sixty patients (26 males and 34 females) and sixty controls (26 males and 34 females); these subjects were matched in gender, age, and ethnicity. Genomic DNA has been extracted fro

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Detection of Shallow Cavities Using 3D Resistivity Technique in a Small Site Near Haditha City, Western Iraq
...Show More Authors

     Iraqi western desert is characterized by a widespread karst phenomenon and caves. Euphrates formation (Lower Miocene) includes enormous sinkholes and cavities within carbonate rocks that usually cause severe damages to any kind of engineering facilities built over it. 3D resistivity imaging techniques were used in detecting this kind of cavities in complicated lithology. The 3D view was fulfilled by collating seven 2D imaging lines. The 2D imaging survey was carried out by Dipole-dipole array with (n) factor and electrode spacing (a) of 6 and 2m respectively. The horizontal slices of the 3D models give a good subsurface picture. There are many caves in all directions (x, y, z). They reveal many small caves near the surface. Thes

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Design and implementation of a Deep Learning-based Intelligent Electronic Lock Door Entry Control System
...Show More Authors

    The Internet of Things (IoT) technology and smart systems are playing a major role in the advanced developments in the world that take place nowadays, especially in multiple privilege systems. There are many smart systems used in daily human life to serve them and facilitate their tasks, such as alarm systems that work to prevent unwanted events or face detection and recognition systems. The main idea of this work is to capture live video using a connected Pi camera, save it, and unlock the electric strike door in several ways; either automatically by displaying a live video connected via USB webcam using a deep learning algorithm of facial recognition and OpenCV or by RFID technology, as well as by detecting abnormal entrance wit

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
Employing Statistical Analysis in Public Relations Researches: (An Analytical Study of the Theses and Dissertations of Public Relations for the Period from 2005 to 2012)
...Show More Authors

 

Public relations are amongst the social sciences that rely on scientific methods in achieving new knowledge or resolving existing problems by means of its scientific researches that are often applied and require a classification in terms of their results’ analysis. It also requires subtle statistical processes whether in constructing their material or in analyzing and interpreting their results.

This research seeks to identify the relation between public relations and statistics, and the significance a researcher or practitioner in the domain of public relations should assign to statistics being one of the important criteria in identifying the accuracy and object

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Some NONPARAMETRIC ESTIMATORS FOR RIGHT CENSORED SURVIVAL DATA
...Show More Authors

The using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible parametric models and these models were nonparametric, many researchers, are interested in the study of the function of permanence and its estimation methods, one of these non-parametric methods.

For work of purpose statistical inference parameters around the statistical distribution for life times which censored data , on the experimental section of this thesis has been the comparison of non-parametric methods of permanence function, the existence

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Hydrology
Complementary data-intelligence model for river flow simulation
...Show More Authors

View Publication
Crossref (80)
Crossref