This research deals with processing and Interpretation of Bouguer anomaly gravity field, using two dimensional filtering techniques to separate the residual gravity field from the Bouguer gravity map for a part of Najaf Ashraf province in Iraq. The residual anomaly processed in order to reduce noise and give a more comprehensive vision about subsurface linear structures. Results for descriptive interpretation presented as colored surfaces and contour maps in order to locate directions and extensions of linear features which may interpret as faults. A comparison among gravity residual field , 1st derivative and horizontal gradient made along a profile across the study area in order to assign the exact location of a major fault. Furthermore, quantitative interpretations applied to residual field in order to detect the depth to the center of a major fault by adopting geometrical modeling. Interpretation results are helpful in delineating the exact locations of lateral changes within the subsurface rock densities around the subsurface major normal fault where sudden variations in gravity values take place. A major fault which extends in NW-SE direction detected at the eastern part of the study area with an approximate depth of 2.8 km to its plane center.
In any natural area or water body, evapotranspiration is one of the important outcomes in the water balance equation. As a significant method and depending on monthly average temperature, estimating of potential Evapotranspiration depending on Thornthwaite method was adopted in this research review. Estimate and discuss evapotranspiration by using Thornthwaite method is the main objectives of this research review with considerable details as well as compute potential evapotranspiration based on climatologically data obtained in Iraq. Temperature - evapotranspiration relationship can be estimated between those two parameters to reduce cost and time and facilitate calculation of water balance in lakes, river, and h
... Show MoreThe present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire
... Show MoreRecently, renewable energy (RE), such as solar energy, sources have proven their importance as an alternative source of fuel. The utilizing of solar energy can contribute to move the world towards relying on clean energy to curb global warming. However, the placement of solar farms is a major priority for planners as it is a critical factor in the succession energy project. This study combines one of the multi-criteria decision-making techniques Analytic Hierarchy Process (AHP) and Geographic Information System (GIS) to assess the suitability of land for establishing solar farms in Iraq. Numerous climatic, geomorphological, economic, and environmental criteria and some exclusionary constraints have been adopted in mode
... Show MoreIn this work optical window for infrared region was prepared by using Aluminum Oxide (Al2O3)material as antireflection coating on ZnSe substrate which covers the atmospheric window 3-5µm. the maximum transition was 97% at a wavelength 0f 4.4µm.
This research aims to realize one of the pillars of Saudi vision (2030) through searching for new sources full of material folklore that had not previously been studied, so this study will study folk motifs engraved on the doors and windows in the Bani Amru Center in the Al-Namas governorate that is situated in the Asir region , in particular the tribe (Bani Rafe), before being disappeared due to the abandonment of the old architecture by the people of the region and their fascination with modern architecture, therefore I must as one of the people of the region document and preserve that through studying, analyzing, classifying it, then inspiring typed paintings using a new technical typing that have not yet been used in the Kingd
... Show MoreThe current research aims to recognize the exploratory and confirmatory factorial structure of the test-wiseness scale on a sample of Hama University students, using the descriptive method. Thus, the sample consists of (472) male and female students from the faculties of the University of Hama. Besides, Abu Hashem’s 50 item test-wiseness scale (2008) has been used. The validity and reliability of the items of the scale have also been verified, and six items have been deleted accordingly. The results of the exploratory factor analysis of the first degree have shown the presence of the following five acceptable factors: (exam preparation, test time management, question paper handling, answer sheet handling, and revision). Moreover,
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreAn Auto Crop method is used for detection and extraction signature, logo and stamp from the document image. This method improves the performance of security system based on signature, logo and stamp images as well as it is extracted images from the original document image and keeping the content information of cropped images. An Auto Crop method reduces the time cost associated with document contents recognition. This method consists of preprocessing, feature extraction and classification. The HSL color space is used to extract color features from cropped image. The k-Nearest Neighbors (KNN) classifier is used for classification.
In this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.
The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di
... Show More