The gravity anomalies of the Jurassic and deep structures were obtained by stripping the gravity effect of Cretaceous and Tertiary formations from the available Bouguer gravity map in central and south Iraq. The gravity effect of the stripped layers was determined depending on the density log or the density density obtained from the sonic log. The density relation with the seismic velocity of Gardner et al (1974) was used to obtain density from sonic logs in case of a lack of density log. The average density of the Cretaceous and Tertiary formation were determined then the density contrast of these formations was obtained. The density contrast and thickness of all stratigraphic formations in the area between the sea level to the top of Jurassic formations were used to determine the gravity effect of these layers. The gravity anomaly map of the stripped formation was determined. The gravity anomaly map of the stripped formation was subtracted from the Bouguer gravity map, and the gravity anomaly map of deep structures was obtained. The regional and residual maps (3rd order polynomial ) were determined for the gravity anomaly maps before and after stripping. The regional gravity map before stripping shows one positive anomaly located at the western part of the study area and west Abu-Jir and Euphrates faults. The regional gravity map after stripping shows a positive anomaly located along an axis extended from Kut toward Najaf. This positive anomaly map divided the sedimentary basin into two sub-basins. The positive gravity residual anomaly of the Bouguer map before stripping shows regionally three structural axes trending NW-SE. These axes are Baghdad-Kut axis, northwest Karbala axis and west Samawa- Nasiriyah axis. The positive residual anomaly map after stripping shows two important anomaly areas. The first area is located between Kut and Karbala-Najaf . and the second is located northwest Karbala by about 100-120 km. These two areas may be prospective areas for hydrocarbon. The stripping method application in the study area shows good result; therefor, it can be used to enhance the gravity data to investigate deep structures in other areas.
A mineralogical study using X-ray diffraction supported by scanning electron microscopic examination on the Paleocene- Eocene Kolosh and Gercus formations from northern Iraq is conducted to show the distribution of clay minerals and their paleoenvironmental implications. Smectite palygorskite, kaolinite, illite, and chlorite are commonly present in varying proportions within the Kolosh and Gercus formations. Association of smectite and chlorite in the claystone of the Paleocene Kolosh Formation refers to marine environment of this formation, whereas development of palygorskite fibers from smectite precursor may relate to post-depositional diagenesis. In addition, the abundance of illite and kaolinite in the Eocen
... Show MoreThis study deals with establishing the depositional environment of the Fatha Formation through facies analysis. It also deals with dividing the formation into units based on the rhythmic nature. Data from selected shallow wells near Hit area and deep wells at East Baghdad Oil field are used. Five major lithofacies are recognized in this study, namely, greenish grey marl, limestone, gypsum (and/or anhydrite), halite and reddish brown mudstone (with occasional sandstone).The limestone lithofacies is divided into three microfacies: Gastropods bioclastic wackestone microfacies, Gastropods peloidal bioclastic packstone, and Foraminiferal packstone microfacies.The lithofacies of the Fatha are nested in a rhythmic pattern or what is known as sh
... Show MoreAcute myeloid leukemia (AML) represents the most prevalent type of acute leukemia in adults and is responsible for approximately 80% of all cases. The tumor suppressor gene (TP53) is a gene that has been frequently studied in cancer, and mutations in this gene account for about 50% of human cancers. This study aims to evaluate the correlation between two single nucleotide polymorphisms (SNPs) in the gene: rs1042522 and rs1642785, and a group of Iraqi patients suffering from pre-diagnostic acute myeloid leukemia (AML). Blood samples were collected from sixty patients (26 males and 34 females) and sixty controls (26 males and 34 females); these subjects were matched in gender, age, and ethnicity. Genomic DNA has been extracted fro
... Show MoreIn this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
Iraqi western desert is characterized by a widespread karst phenomenon and caves. Euphrates formation (Lower Miocene) includes enormous sinkholes and cavities within carbonate rocks that usually cause severe damages to any kind of engineering facilities built over it. 3D resistivity imaging techniques were used in detecting this kind of cavities in complicated lithology. The 3D view was fulfilled by collating seven 2D imaging lines. The 2D imaging survey was carried out by Dipole-dipole array with (n) factor and electrode spacing (a) of 6 and 2m respectively. The horizontal slices of the 3D models give a good subsurface picture. There are many caves in all directions (x, y, z). They reveal many small caves near the surface. Thes
... Show MoreThe Internet of Things (IoT) technology and smart systems are playing a major role in the advanced developments in the world that take place nowadays, especially in multiple privilege systems. There are many smart systems used in daily human life to serve them and facilitate their tasks, such as alarm systems that work to prevent unwanted events or face detection and recognition systems. The main idea of this work is to capture live video using a connected Pi camera, save it, and unlock the electric strike door in several ways; either automatically by displaying a live video connected via USB webcam using a deep learning algorithm of facial recognition and OpenCV or by RFID technology, as well as by detecting abnormal entrance wit
... Show More
Public relations are amongst the social sciences that rely on scientific methods in achieving new knowledge or resolving existing problems by means of its scientific researches that are often applied and require a classification in terms of their results’ analysis. It also requires subtle statistical processes whether in constructing their material or in analyzing and interpreting their results.
This research seeks to identify the relation between public relations and statistics, and the significance a researcher or practitioner in the domain of public relations should assign to statistics being one of the important criteria in identifying the accuracy and object
... Show MoreThe using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible parametric models and these models were nonparametric, many researchers, are interested in the study of the function of permanence and its estimation methods, one of these non-parametric methods.
For work of purpose statistical inference parameters around the statistical distribution for life times which censored data , on the experimental section of this thesis has been the comparison of non-parametric methods of permanence function, the existence
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show More