Preferred Language
Articles
/
jnhm-164
DETECTION OF SUBSURFACE CAVITIES BY THE ELECTROMAGNETIC METHOD (Case Study at Haditha Area)
...Show More Authors

Two EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of the method of partial least squares and the algorithm of singular values decomposion to estimate the parameters of the logistic regression model in the case of the problem of linear multiplicity by using the simulation
...Show More Authors

The logistic regression model is an important statistical model showing the relationship between the binary variable and the explanatory variables.                                                        The large number of explanations that are usually used to illustrate the response led to the emergence of the problem of linear multiplicity between the explanatory variables that make estimating the parameters of the model not accurate.    

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Fracture Resistance of Endodontically Treated Premolar Teeth with Extensive MOD Cavities Restored with Different Bulk Fill Composite Restorations (An In vitro Study)
...Show More Authors

Background: The present in-vitro study was undertaken to evaluate and compare fracture resistance of weakened endodontically treated premolars with class II MOD cavities restored with different bulk fill composite restorations (EverX posterior, Alert, Tetric EvoCeram Bulk Fill, and SDR). The type and mode of fracture were also assessed for all the experimental groups. Materials and Method: Forty-eight human adult maxillary premolar teeth were selected for this study. Standardized extensive class II MOD cavities with endodontic treatment were prepared for all teeth, except those that were saved as intact control. The teeth were divided into six groups of eight teeth each (n=8): (Group 1) intact control group, (Group 2) unrestored teeth with

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Surface-Subface Geochemical and Mineralogical Study of Gypcrete in Alexandria Area Central Iraq
...Show More Authors

Gypsiferous soil deposits (Gypcrete) are weakly consolidate earthy mixture of secondary gypsum, sand and clay. It is formed in arid and semi- arid area with annual precipitation rainfall less than 400mm. These sediments occur in surface and subsurface in region of little rainfall and rapid evaporation. This research deals with the study of gypcrete in Alexandria to improve the mineralogical and geochemical properties of the gypcrete. The gypcrete soil is used as raw material to produce the plaster for building purposes. Three samples of gypcrete were chemically and geochemically analyzed. The common mineral is howed in 0-0.5m Gypsum followed by Calcite in 0-1m and Quartz in 1-1.5m due to leaching and infiltration by rainfall as well as it

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
Design and Construction of a Dust Detection System using Infrared Laser: The Case of Dust Storms in Baghdad in the Summer 2022
...Show More Authors

Iraq suffers from serious pollution with harmful particles that have important direct and indirect effects on human activities and human health. In this research, a system for detecting pollutants in the air was designed and manufactured using infrared laser technology. This system was used to detect the presence of pollutants in the dust storms that swept the city of Baghdad which could have a negative impact on human health and living organisms.

The designed detection system based on the use of infrared laser (IR) with a wavelength of 1064 nm was used for the purposes of detecting pollutants based on the scattering of the laser beam from these pollutants. The system was aligned to obtain the best signal for the scattered rays, w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 20 2008
Journal Name
Journal Of Planner And Development
Urban Area Administration
...Show More Authors

As known, all urban areas are submitted to supervision of independent administration and agencies taken the responsibility of full-filling the service function and protecting the environment with limited investment allocated , controlled by several laws and arrangements, that are contradictory to each other , the result , deteriorate the level of provided services in urban areas and different environmental problems apper , In addition to waste of efforts and resources , This required a great interest to urban areas administration . So , this paper gives attention to the basic standards that must take in consideration of urban areas administration , and the constraint that faces the administration agencies in general , to achieve

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 06 2019
Journal Name
Journal Of The College Of Education For Women
The Effect use of the Internet in Academic Libraries A Case Study
...Show More Authors

The aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.

View Publication Preview PDF
Publication Date
Tue Jul 01 2008
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
THE STUDY OF MINERALOGICAL AND MICROFACIES ANALYSIS SHIRANISH FORMATION WELL (KH-6) ANSAB AREA IN SOUTHERN IRAQ
...Show More Authors

The study of Shiranish Formation rocks in southern part of Iraq at Ansab area well (KH-6)
were carried out. The formation is tongued with tayarat formation, which bounded from top
and bottom, the upper tongue at thickness 49m. and tongued at depth (476-525m.) the lower
tongue at thickness 4m. tongued at (541-537m.).
The rocks of this formation were divided into three sedimentary microfacies:
1- Dolomitized formininferal Wackestone facies.
2- Dolomitized formininferal Mudstone facies.
3- Dolostone facies.
34 slides were investigated depending on mineralogical, compositional and biological
processes and compared diagenesis which reflect open marine shelf at lower part of formation
(F.Z.2) (S.M.F.8), but at the

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref