The friendly-environment geophysical methods are commonly used in various engineering and near-surface environmental investigations. Electrical Resistivity Imaging technique was used to investigate the subsurface rocks, sediments properties of a proposed industrial site to characterize the lateral and vertical lithological changes. via the electrical resistivity, to give an overview about the karst, weak and robust subsoil zones. Nineteen 2D ERI profiles using Wenner array with 2 m electrode spacing have been applied to investigate the specific industry area. One of these profiles has been conducted with one-meter electrode spacing. The surveyed profiles are divided into a number of blocks, each block consists of several parallel profiles in a specific direction. The positions of Electrical Resistivity Imaging profiles in the project area have been determined according to a preliminary subject plan from the civil engineers for factory foundation constructions and proposed locations of heavy machines. The inversion results of profiles showed that areas of blocks A, B, C, and D consist mainly of clastic rocks and sediments, e.g., claystone, siltstone and sandstone. The Electrical Resistivity Imaging inversion sections of blocks A, B, C, and D do not show any indication of cavitation or weak zones of sizes more than 2.0 meters, and no signs of gypsum bodies are found in these areas in general. Gypsum bodies are probably detected at block E, the southern part of the study area. The researchers recommended to keep these rocks in block E away from the continuous running water to avoid cavitation. Furthermore, the construction of heavy machines should keep away from this part of the study area to avoid to some extent, subsoil failure and subsidence in the future. Middle and Northern parts are more consistent to the constructions and factory foundations.
Many stone tools were found on a hill south of the Hor Al-Dalmaj which is located in the central part of the alluvial plain of Mesopotamia, between the Tigris and Euphrates Rivers. The types of rocks from which the studied stone tools were made are not found in the alluvial plain, because it consists of friable sand, silt, and clay. All existing sediments were precipitated in riverine environments such as point bar, over bank, and floodplain sediments. The collected stone tools were described with a magnifying glass (10 x) and a polarized microscope after they were thin sectioned. Microscopic analysis showed that these stone tools are made of sedimentary, volcanic igneous and metamorphic rocks, such as: sandstones, limestones, chert, con
... Show MoreObjective(s): To describe the demographic attributes, vaccination status of measles patients and the occurrence of
the disease according to time and place in Kirkuk governorate during the year 2010.
Methodology: The epidemiological study (a descriptive study) on measles cases was carried out in Kirkuk province
which is one of the Iraqi governorates from January 20th to July 30th, 2011. Data were collected retrospectively by
review of patients' files that were registered at the department of statistic in health directorate of Kirkuk during the
year 2010. A purposive "non-probability" sample of (152) confirmed measles cases (clinically and laboratory) that
were registered at the department of statistic in health directora
The study aimed to survey mushroom species from fields among herbs, palm trunks, and trees in central Iraq and to identify them on the basis of morphological and molecular characteristics. As a molecular identification result with polymerase chain reaction six species were recorded (with eight isolates): Agaricus bitorquis (Quéllt) Saccardo. 1887 (SHA14); Candolleomyces candolleanus (Fr.) D. Wächter & Melzer, 2020 (SHA15); Cyclocybe cylindracea (D.C.) Vizzini & Angelini, 2014 (SHA13); Leucoagaricus hesperius Vellinga, 2010 (SHA16); Volvariella sp. (SHA17), and Volvopluteus gloiocephalus (D. C.) Vizzini, Contu & Justo, 2011 (SHA10, SHA101 and SHA12), belonging to four families of Basidiomycetes: Agaricaceae, Pluteaceae,
... Show MoreThe present work provides theoretical investigation of laser photoacoustic one dimensional imaging to detect a blood vessel or tumor embedded within normal tissue. The key task in photoacoustic imaging is to have acoustic signal that help to determine the size and location of the target object inside normal tissue. The analytical simulation used a spherical wave model representing target object (blood vessel or tumor) inside normal tissue. A computer program in MATLAB environment has been written to realize this simulation. This model generates time resolved acoustic wave signal that include both expansion and contraction parts of the wave. The photoacoustic signal from the target object is simulated for a range of laser pulse duration 1
... Show MoreThis paper presents an efficient methodology to design modified evaporative air-cooler for winter air-conditioning in Baghdad city as well as using it for summer air-conditioning by adding a heating process after the humidification process. laboratory tests were performed on a direct evaporative cooler (DEC) followed by passing the air on hot water through heat exchanger placed in the coolers air duct exit. The tests were conducted on the 2nd of December /2011 when the ambient temperature was 8.1°C and the relative humidity was (68%). The air flow rate is assumed to vary between 0.069 to 0.209 kg/s with constant water flow rate of 0.03 kg/s in the heat exchanger. The performance is reported in terms of effectiveness of DEC, satura
... Show MoreAbstract
For sparse system identification,recent suggested algorithms are
-norm Least Mean Square (
-LMS), Zero-Attracting LMS (ZA-LMS), Reweighted Zero-Attracting LMS (RZA-LMS), and p-norm LMS (p-LMS) algorithms, that have modified the cost function of the conventional LMS algorithm by adding a constraint of coefficients sparsity. And so, the proposed algorithms are named
-ZA-LMS,
Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show More