Preferred Language
Articles
/
ijs-565
Application of the Predictive deconvolution on a seismic line Al-Najaf and Al-Muthanna Governorates in Southern Iraq
...Show More Authors

This study deals with the processing  of field seismic data for a seismic line located within the administrative boundaries of Najaf and Muthanna governorates in southern Iraq (7Gn 21) with a length of 54 km. The study was conducted within the Processing Department of the Oil Exploration Company using the Omega  system, which contains a large number of programs that deal with processing, through the use of these programs applied  predictive deconvolution  of both( gap) and (spike). The final section was produced for both types. The gap predictive deconvolution  gave improvement in the shallow reflectors while in deep reflectors it did not give a good improvement, thus giving a good continuity of the reflectors at the expense of resolution, whereas spike  predictive deconvolution  caused an increase in frequency noise in seismic sections, giving a good resolution at the expense of continuity.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 19 2024
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of Andrews' six keys of normal occlusion in a sample of Iraqi adults in Baghdad city
...Show More Authors

Background: The Andrews’ six keys of normal occlusion contribute individually and collectively to the total scheme of occlusion and, therefore, are viewed as essential to successful orthodontic treatment. The present research aims to evaluate the presence of the parameters of the Andrews’ Six Keys of normal occlusion in a sample of 100 Iraqi adults with complete permanent dentition and clinically acceptable normal occlusion (Angle’s Class I) in Baghdad city. Their age range 18-25 years (60 males and 40 females). Materials and methods: Each patient was subjected to clinical examination and then study cast models were made, with their occlusal records. The measuring tools that have been used involved: Three-dimensional goniometer to me

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Content of Data Journalism in Security Topics - Security Media Cell Model Research extracted from a master’s thesis
...Show More Authors

This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
Return in the gift and its contraindications in Islamic jurisprudence and Iraqi law
...Show More Authors

In his life, a person engages in different types of verbal and actual dispositions that result in various effects, some of which are necessary and not valid, such as selling, and some are not necessary for one of the two contracting parties, such as a mortgage or both, such as lending and agency. However, there are some actions that are sometimes necessary and not necessary at other times, such as a gift that indicates in its simplest sense. Owning money for another without compensation, it is one of the doors of benevolence and benevolence, and it is one of the attributes of perfection with which God, may He be glorified and exalted be He, described Himself. - And if this analogy is the difference - and distanced himself from greed, the

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Difficulties of scientific research in the financial and administrative fieldaccording to the quality standardsfrom the point of view of the teachers
...Show More Authors

The research aims to identify the most important difficulties facing the scientific research in the technical university in the financial, organizational and administrative according to the quality standards according to the paragraphs studied in the questionnaire questionnaire prepared for this purpose, including the research community on the Central Technical University, which includes several technical colleges and technical institutes were selected A sample of the researchers in the Institute of Technical Management where the number of training was 78 teachers took a random sample of researchers amounted to 40% of the questionnaire, and after the collection and classification of data were used statistical means, including the mean ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 02 2020
Journal Name
International Journal Of Pharmaceutical Research
Serum Afamin As A Novel Biomarker for Non-Alcoholic Fatty Liver Disease as A Complication of Hypothyroidism in Iraqi Patients.
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Dec 19 2024
Journal Name
Al–bahith Al–a'alami
ACADEMIC TRAINING IN MEDIA AND COMMUNICATION SCIENCES AND ITS RELATIONSHIP TO MEDIA PRACTICE:: (Reading In The Nature Of The Relationship: Integration Or Separation)
...Show More Authors

The aim of this scientific study is to diagnose the nature of the relationship between academic education in the field of media, communication and media practice. The university offers theoretical and practical lessons to students on the concepts of communication sciences, theories, models, legislations, ethics, and techniques over three years or more. And the diploma in the field of communication and Media Sciences gives students the opportunity to work in the field of journalism and media in the future, this is what many academics and media thinkers in Algeria believe, while another trend sees the exact opposite: The study of information and communication sciences within the university in the form of theoretical lessons cannot contribu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
The Concept of Value in De Saussair Linguistics and their Extension in the Book (Arabic Language, Its Meaning and Structure) by Tammam Hassan
...Show More Authors

This research was distributed into two sections, the first section was concerned with the concept of value for De Saussair and its methodological impact on his linguistic structural conceptions with respect of the distinction between synchronism and diachronism, the value role of linking function between the sounds and the though, the basing of his theoretical conception on the language being a form and not a material according to this principle and the value impact on the demonstration that the linguistic element acquires its functional importance from the relations inside the language system. It also stopped at the methodological impact of value on defining the analytical linguistic unit and the value role in semantics through the prin

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
In Vitro The Effect of Canals Instrumented With Three Rotary Ni-Ti Systems on The Dislocation Resistance of Guttafusion® Versus Single Cone Obturation Technique
...Show More Authors

Background: Complete seal of the root canal system following its chemo-mechanical debridement plays a pivotal role for achieving successful endodontic treatment. This can be established by reducing the gaps between the core filling material and root canal wall. Aim: To assess and compare the dislocation resistance of root canals obturated with GuttaFusion® and TotalFill BC sealer versus single cone obturation technique and TotalFill BC sealer after instrumentation of the canals with WaveOne, ProTaper Next and ProTaper Universal system. Material and Method: Sixty extracted human permanent mandibular premolars were conducted in the current study. The teeth were decorated and left the root with 15mm length; the roots were divided randoml

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE
...Show More Authors

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus Crossref