This research deals with processing and Interpretation of Bouguer anomaly gravity field, using two dimensional filtering techniques to separate the residual gravity field from the Bouguer gravity map for a part of Najaf Ashraf province in Iraq. The residual anomaly processed in order to reduce noise and give a more comprehensive vision about subsurface linear structures. Results for descriptive interpretation presented as colored surfaces and contour maps in order to locate directions and extensions of linear features which may interpret as faults. A comparison among gravity residual field , 1st derivative and horizontal gradient made along a profile across the study area in order to assign the exact location of a major fault. Furthermore, quantitative interpretations applied to residual field in order to detect the depth to the center of a major fault by adopting geometrical modeling. Interpretation results are helpful in delineating the exact locations of lateral changes within the subsurface rock densities around the subsurface major normal fault where sudden variations in gravity values take place. A major fault which extends in NW-SE direction detected at the eastern part of the study area with an approximate depth of 2.8 km to its plane center.
This work evaluates the economic feasibility of various production scenarios for the Zubair reservoir in the Kifl oil field using cash flow and net present value (NPV) calculations. The Kifl field is an exploratory field that has not yet been developed or assessed economically. The first well was drilled in 1960, and three other wells were later drilled to assess the oil accumulation, so in this research, Different production scenarios were evaluated economically. These scenarios were proposed based on the reservoir model of the Zubair formation in the field. The research methodology used QUE$TOR software to estimate capital expenditures (CapEx) and operating expenditures (OpEx) based on field-level data, production prof
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThe control of water represents the safe key for fair and optimal use to protect water resources due to human activities, including untreated wastewater, which is considered a carrier of a large number of antibiotic-resistant bacterial species. This study aimed to investigate the prevalence of antibiotic-resistance to E. coli in Tigris River by the presence of resistance genes for aminoglycoside(qepA( ,quinolone (gyrA), and sulfa drugs( dfr1 ,dfr17) due to the frequent use of antibiotics and their release into wastewater of hospitals. Samples were collected from three sites on Tigris River: S1( station wastewater in Adhamiya), S2 (station wastewater in Baghdad Medical city hospital), S3 (station wastew
... Show MoreThis research is concerned with the re-analysis of optical data (the imaginary part of the dielectric function as a function of photon energy E) of a-Si:H films prepared by Jackson et al. and Ferlauto et al. through using nonlinear regression fitting we estimated the optical energy gap and the deviation from the Tauc model by considering the parameter of energy photon-dependence of the momentum matrix element of the p as a free parameter by assuming that density of states distribution to be a square root function. It is observed for films prepared by Jackson et al. that the value of the parameter p for the photon energy range is is close to the value assumed by the Cody model and the optical gap energy is which is also close to the value
... Show MoreThe purpose of this paper is to gain a good understanding about wake region behind the car body due to the aerodynamic effect when the air flows over the road vehicle during its movement. The main goal of this study is to discuss the effect of the geometry on the wake region and the aerodynamic drag coefficient. Results will be achieved by using two different shapes, which are the fastback and the notchback. The study will be implemented by the Computational Fluid Dynamic (CFD) by using STAR-CCM+® software for the simulation. This study investigates the steady turbulent flow using k-epsilon turbulence model. The results obtained from the simulation show that the region of the air separation behind the vehicle
... Show MoreAlthough text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Brain Fingerprinting (BF) is one of the modern technologies that rely on artificial intelligence in the field of criminal evidence law. Brain information can be obtained accurately and reliably in criminal procedures without resorting to complex and multiple procedures or questions. It is not embarrassing for a person or even violates his human dignity, as well as gives immediate and accurate results. BF is considered one of the advanced techniques related to neuroscientific evidence that relies heavily on artificial intelligence, through which it is possible to recognize whether the suspect or criminal has information about the crime or not. This is done through Magnetic Resonance Imaging (EEG) of the brain and examining
... Show MoreThe research aims to verifying the tax exemptions granted in accordance with the Iraqi tax legislations, showing their suitability for basic tax rules, and identifying their role to reduce the tax evasion phenomenon and the negative effects resulting therefrom, which arerepresented by a decrease in the proceeds of tax revenue and therefore leadings to a reduction of public revenues of the state. Also, the research tries to identify the ways to reduce cases of tax evasion due to their reflection positively on the public budgetof the state. The data of the research was collected through two models of questionnaires distributed to a sample of taxpayers from some professions and a sample of the tax administration staff. The research has reac
... Show More