Preferred Language
Articles
/
ijs-9953
Linking the Timing of Deposition and Organic Matter Richness of the Gulneri Formation of Northern Iraq to the Global Oceanic Anoxic Event 2 (OAE 2): Implications to better constrain the Depositional Models of Iraqi's Oil Source Beds and their Timing of De
...Show More Authors

Global oceanic anoxic events (OAEs) are events of immense importance for a variety of reasons. For instance, they are not only behind most if not all of the mass extinctions which took place during the Cenozoic era, but they are the harbinger for the world's best oil source beds, which humanity depends on to satisfy its energy need. In spite of this, there was little effort to document their presence in Iraq, to fill in for the void here, and as a first step, this paper will attempt to establish a cause and effect relationship between OAE 2 and the Gulneri Formation timing of deposition and organic matter richness. This was done by showing the prevalent occurrence of the globally known OAE 2 positive ∂13Corg excursion and the unique rock-eval fingerprints all through the Gulneri Formation.
The lessons learned are rather many and important. First is the laying down of stringent constraints on the Gulneri Shale age assignment. In view of this study results, this formation age ought to be bracketed between the latest Cenomanian to the earliest Turonian, or in the language number between 93.5 to 93.9 Ma. The second lesson is the gaining of an in-depth expose about the depositional model responsible for making the Gulneri shale to become so rich in organic matter. It is hoped from all of this is to lay down a solid ground for constraining the depositional models of other Iraqi oil source beds.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Tadpole Domination in Graphs
...Show More Authors

A new type of the connected domination parameters called tadpole domination number of a graph is introduced. Tadpole domination number for some standard graphs is determined, and some bounds for this number are obtained. Additionally, a new graph, finite, simple, undirected and connected, is introduced named weaver graph. Tadpole domination is calculated for this graph with other families of graphs.

View Publication Preview PDF
Scopus (29)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Hn-Domination in Graphs
...Show More Authors

The aim of this article is to introduce a new definition of domination number in graphs called hn-domination number denoted by . This paper presents some properties which show the concepts of connected and independent hn-domination. Furthermore, some bounds of these parameters are determined, specifically, the impact on hn-domination parameter is studied thoroughly in this paper when a graph is modified by deleting or adding a vertex or deleting an edge.

View Publication Preview PDF
Scopus (49)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Fuzzy-assignment Model by Using Linguistic Variables
...Show More Authors

      This work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
A Computerized Integrated System for Geodetic Networks Design
...Show More Authors

This research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadri

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Engineering
Internal Convective Heat Transfer Effect on Iraqi Building Construction Cooling Load
...Show More Authors

This work involves the calculation of the cooling load in Iraqi building constructions taking in account the effect of the convective heat transfer inside the buildings. ASHRAE assumptions are compared with the Fisher and Pedersen model of estimation of internal convective heat transfer coefficient when the high rate of ventilation from ceiling inlet configuration is used. Theoretical calculation of cooling load using the Radiant Time Series Method (RTSM) is implemented on the actual tested spaces. Also the theoretical calculated cooling loads are experimentally compared by measuring the cooling load in these tested spaces. The comparison appears that using the modified Fisher and Pedersen model when large ventilation ra

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Education College Wasit University
تقصي فاعلية التعليم الالكتروني خلال فيروس كورونا المستجد (كوفيد 19) في كلية التربية للبنات/ جامعة بغداد
...Show More Authors

      تبنت العديد من المؤسسات الأكاديمية التعلم الإلكتروني منذ سنوات ، وقد أثبت فاعليته في كثير من هذه المؤسسات لاسيما تلك المهتمة بتعلم اللغات الاجنبية. الا انه  مع انتشار جائحة كورونا اصبح التعليم الالكتروني  ضرورة ملحة في الجامعات في جميع أنحاء العالم ، بما في ذلك الجامعات العراقية.  تهدف الدراسة الحالية إلى تقصي أثر هذا الوباء على التعلم الإلكتروني في أحدى الكليات العراقية . يفترض الباحث أن تقبل ال

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Some New Results on Lucky Labeling
...Show More Authors

Czerwi’nski et al. introduced Lucky labeling in 2009 and Akbari et al and A.Nellai Murugan et al studied it further. Czerwi’nski defined Lucky Number of graph as follows: A labeling of vertices of a graph G is called a Lucky labeling if  for every pair of adjacent vertices u and v in G where . A graph G may admit any number of lucky labelings. The least integer k for which a graph G has a lucky labeling from the set 1, 2, k is the lucky number of G denoted by η(G). This paper aims to determine the lucky number of Complete graph Kn, Complete bipartite graph Km,n and Complete tripartite graph Kl,m,n. It has also been studied how the lucky number changes whi

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Automatic Number Extraction from Fixed Imaging Distance
...Show More Authors

     Developed countries are facing many challenges to convert large areas of existing services to electronic modes, reflecting the current nature of workflow and the equipment utilized for achieving such services. For instance, electricity bill collection still tend to be based on traditional approaches (paper-based and relying on human interaction) making them comparatively time-consuming and prone to human error.

This research aims to recognize numbers in mechanical electricity meters and convert them to digital figures utilizing Optical Character Recognition (OCR) in Matlab. The research utilized the location of red region in color electricity meters image to determine the crop region that contain the meters numbers, then

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Petroleum Science And Engineering
Factors affecting gel strength design for conformance control: An integrated investigation
...Show More Authors

View Publication
Crossref (5)
Crossref