Preferred Language
Articles
/
ijs-9242
Basin or Intrusion, a New Method to Resolve Non-Uniqueness in Gravity Interpretation

The aim of the current paper is to resolve the non-uniqueness in gravity interpretation through searching for singular points in the gravity field that are coincide with causative body vertices. The Absolute Second Horizontal Gradient (ASHG) method is used to locate the horizontal reference location of the body, while its amplitude could be used to define body corner depth. Intelligent use of the ASHG method could help in differentiating between basin and intrusion structures from their gravity effect and could facilitate the interpretation in forward modeling and constrain inversion modeling to maximum limit. The method is tested by using many synthetic examples with different types of shapes. A real data is used to examine the method and give a decisive result about the type and shape of the causative body.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 14 2022
Journal Name
Iraqi Journal Of Science
Gravity Field Interpretation for Subsurface Faults Detection in A Region Located SW- Iraq

This research deals with processing and Interpretation of Bouguer anomaly gravity field, using two dimensional filtering techniques to separate the residual gravity field from the Bouguer gravity map for a part of Najaf Ashraf province in Iraq. The residual anomaly processed in order to reduce noise and give a more comprehensive vision about subsurface linear structures. Results for descriptive interpretation presented as colored surfaces and contour maps in order to locate directions and extensions of linear features which may interpret as faults. A comparison among gravity residual field , 1st derivative and horizontal gradient made along a profile across the study area in order to assign the exact location of a major fault. Furthermor

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 03 2017
Journal Name
Baghdad Science Journal
Gravity Field Interpretation for Major Fault Depth Detection in a Region Located SW- Qa’im / Iraq

This research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-

... Show More
Scopus (4)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Mar 27 2019
Journal Name
Iraqi Journal Of Science
Gravity and Magnetic Interpretation to Study Deep Crustal Structures In Karbala and Surrounding Areas-Central Iraq

Gravity and magnetic data were used to study the deep crustal structures in Karbala and surrounding areas in central Iraq. The space window method was used to separate the residual from regional anomalies of gravity and magnetic data, the spaces of window are equal to 48,36 and 24 km. The Total Horizontal Derivative (THD) techniques and local wavenumber of gravity and magnetic are used to identify the faults and their trends with the basement rocks.  The N45W, N45E, N-S and rarely E-W trends of faults are detected in the basement rock. It is believed that some of these faults extending from the basement to the uppermost layer of the sedimentary rocks.

View Publication Preview PDF
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Quantitative Interpretation of Gravity and Magnetic Anomalies in West of Tikrit City and Surroundings, Iraq

     A quantitative interpretation of gravity and magnetic anomalies in west of Tikrit city and surroundings, has been completed utilizing Grav2dc and Mag2dc (2D, 2.5D) forward techniques. The modeling has been carried out along four profiles, two NW-SE profiles along the distinct gravity residual anomalies and two NE-SW profiles along the magnetic residual anomalies. The most geologic plausible model that matches the data was picked. The model along the gravity profile (A-A') reveal faulting of the basement, whereas along the profiles B-B', C-C' and D-D' did not present faulting. The models comprise of two rock units, the first is the sedimentary cover and the second unit i

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
The Bouguer Anomaly Map of Iraq According to a New Local Theoretical Gravity Equation and Its Geological Importance

Four hundred and seventy eight gravity base stations in Iraq were used to obtain a new local theoretical gravity equation. The obtained equation was used to construct a Bouguer anomaly map of Iraq depending on the available gravity base stations. This map was compared with the Bouguer map constructed for the same stations using the international formula (1930). Good similarity in shapes and locations of the anomaly were observed, while the   gravity anomaly values in the new map were increased by about 30 mGal. The eastern zero gravity contour line of the new obtained gravity map coincides with the western  boundary of the tectonic Mesopotamian zone, while the main negative  gravity values coincide with the Mesopotami

... Show More
Scopus (5)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Jan 30 2014
Journal Name
Al-kindy College Medical Journal
Ventriculoperitonealshunt, Programmable or non-programmable

Background:Hydrocephalus is dilatation of the ventricular system due to excessive production and/ or obstruction of cerebrospinal fluid (CSF) pathways. Different surgical procedure are used to treat this disease. Ventriculo peritoneal shunt is by far the most popular technique for CSF diversion..
Objective;To compare the programmable and non-programmable valves regarding the complications of both types
Methods:This study was conducted in the Neurosurgical hospital of Baghdad/Iraq over a period of 3 years from July 2008 to August 2011.
A special inclusion criteria has been tabulated for the selection of patients..
Results:.Fifty cases with hydrocephalus admitted and diagnosed by CT scan and treated by ventriculoperitoneal shun

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
The Oil Fields Relation to the Tectonic Boundaries that inferred from Seismic and Gravity Interpretation in Kut-Hai-Fajir and Surrounding Area, Central Iraq

The seismic reflection and gravity data were used to detect the tectonic boundaries in Kut-Hai-Fajir and surrounding areas, central Iraq. The depth maps of Dammam, Nhr Umr, and Sulaiy, formations were constructed and used to detect some boundareis in the study area. The residual gravity map and Total Horizantal derivative (THDR) also used to detected the tectonic boundaries. It is obtained that most boundaries or faults found in the deep formations; while some of them showen in the shallow fomations. The faults or boundaries obtained from gravity intrpretation mostly coincied with the deepest formation boundaries. Generally, the grvity anomalies conform the morphological feature locations within the depth maps of the formations. Many lon

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Nov 24 2017
Journal Name
Journal Of Engineering
A new analytic method to tune a fractional order PID controller

This paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a third order linear time

... Show More
Publication Date
Fri Nov 24 2017
Journal Name
Journal Of Engineering
A New Analytic Method to Tune a Fractional Order PID Controller

This paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a thir

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
Crossref (14)
Crossref
View Publication Preview PDF