This research deals with processing and Interpretation of Bouguer anomaly gravity field, using two dimensional filtering techniques to separate the residual gravity field from the Bouguer gravity map for a part of Najaf Ashraf province in Iraq. The residual anomaly processed in order to reduce noise and give a more comprehensive vision about subsurface linear structures. Results for descriptive interpretation presented as colored surfaces and contour maps in order to locate directions and extensions of linear features which may interpret as faults. A comparison among gravity residual field , 1st derivative and horizontal gradient made along a profile across the study area in order to assign the exact location of a major fault. Furthermore, quantitative interpretations applied to residual field in order to detect the depth to the center of a major fault by adopting geometrical modeling. Interpretation results are helpful in delineating the exact locations of lateral changes within the subsurface rock densities around the subsurface major normal fault where sudden variations in gravity values take place. A major fault which extends in NW-SE direction detected at the eastern part of the study area with an approximate depth of 2.8 km to its plane center.
Technological development in recent years leads to increase the access speed in the networks that allow a huge number of users watching videos online. Video streaming is one of the most popular applications in networking systems. Quality of Experience (QoE) measurement for transmitted video streaming may deal with data transmission problems such as packet loss and delay. This may affect video quality and leads to time consuming. We have developed an objective video quality measurement algorithm that uses different features, which affect video quality. The proposed algorithm has been estimated the subjective video quality with suitable accuracy. In this work, a video QoE estimation metric for video strea
... Show MoreDeriving land cover information from satellite data is one of the most common applications employed to monitor, evaluate, and manage the environment. This study aims to detect the land cover/land use changes and calculate the areas of different land cover types in Baghdad, Iraq, for the period from 2015 to 2020, using Landsat 8 images. The supervised Maximum Likelihood Classification (MLC) method was applied to classify the images. Four land cover types were obtained, namely urban, vegetation, water, and barren soil. Changes in the four land cover classes during the study period were observed. The extent of the urban, vegetation, and water areas was increased by about 7.5%, 9.5%, and 1.5%, respectively, whereas t
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreThis study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show Morethis paper presents a novel method for solving nonlinear optimal conrol problems of regular type via its equivalent two points boundary value problems using the non-classical
Objective: The aim of this study is to detect the effect of continuous exposure to Sodium Nitrite on 8-oxoguanine
DNA glycosylase (OGG1) gene which responsible on DNA repairs. DNA repair play a major role in maintaining
genomic stability when DNA exposure to damage. Genomic stability is very important for keeping body cells
healthy and to prevent many types of tumor development. Many genes are responsible for this job; one of them is
OGG1 gene.
Methodology: In current study two groups of mice were chronically exposed to sodium nitrite for six months and
eighteen months while third group was used as a control. Then sizes of OGG1 were estimated.
Results: The results exhibited in the unexposed (control) mice had two dif
Plant extracts occupied a big place in diseases treatment and preserving human health because, they contain many active substances that can be exploited in the field of pharmaceutical manufacturing from natural materials. Therefore, this study was conducted to evaluate the effect of different concentrations of plant extracts for each of Nigella sativa, Alliumsativum and Allium cepa against the fungal growth of Candida albicans that cause many skin diseases and infections to humans as well as Trichophyton mentagrophytes, which affects the hair, skin and nails. These two fungi have been isolated and diagnosed from people who have skin infection. Both fungal isolates were treated with extracts of Nigella sativa, Alliumsativum and Allium cepa
... Show MoreIn this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show More