ما من شك ان الارهاب يعُد من اكثر الجرائم رعباً في الوقت الراهن، وقد اتخذت الجرائم الارهابية مع الزمن منحى آخر حيث استثمر الارهابيون مستحدثات العلم الحديث وبدءوا باستحداث وسائل جديدة في اداء العمل الارهابي بدون عنف أو اراقة دماء، كما تم تجنيد العديد من العلماء والباحثين المارقين والمأجورين من قبل التنظيمات الارهابية او من قبل دول وذلك من اجل تنفيذ جرائمهم الارهابية.
ولقد تفاقمت مشكلة
... Show MoreThe Mishrif Formation is one of the most important formation in oil fields, which is located in southern part of Iraq, and it is of Upper Cretaceous age. Tuba field is located nearly 40 km SW – Basrah city. It is bounded from east by Zubair oil field (5 km distance) and from west by Rumaila (2 km distance). The Tuba oil field is situated between Zubair oil field in the east and Rumaila in the west, and is separated by two depressions.
The rock (core and chips) samples have been collected systematically from cores of Mishrif Formation that are available from stores of southern oil company to prepare thin sections and slides—these slides have been examined by using microscope. These samples have been taken from all parts of the rese
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreMetaheuristic is one of the most well-known fields of research used to find optimum solutions for non-deterministic polynomial hard (NP-hard) problems, for which it is difficult to find an optimal solution in a polynomial time. This paper introduces the metaheuristic-based algorithms and their classifications and non-deterministic polynomial hard problems. It also compares the performance of two metaheuristic-based algorithms (Elephant Herding Optimization algorithm and Tabu Search) to solve the Traveling Salesman Problem (TSP), which is one of the most known non-deterministic polynomial hard problems and widely used in the performance evaluations for different metaheuristics-based optimization algorithms. The experimental results of Ele
... Show MoreMany new heterocyclic compounds including 4-thiazolidinones containing indole with triazole units were described. The new Schiff bases [VII]a, b and [VIII]a,b synthesized by condensation acid hydrazides [II],[VI] with different (aromatic) aldehydes in absolute ethanol. The refluxing equimolar amounts of the Schiff bases ([VII]a,b, [VIII]a,b) with thioglycolic acid in benzene led to get thiazolidin-4-ones derivatives ([IX]a,b and [X]a-d). Finally, the new derivatives [XI]a-c run out via the reacted compound [IX]a with di
Groundwater modelling is particularly challenging in arid regions where limited water recharge is available. A fault zone will add a significant challenge to the modelling process. The Western Desert in Iraq has been chosen to implement the modelling concept and calculate the model sensitivity to the changes in aquifer hydraulic properties and calibration by researching 102 observations and irrigation wells. MODFLOW-NWT, which is a Newtonian formulation for MODFLOW-2005 approaches, have been used in this study. Further, the simulation run has been implemented using the Upstream-Weighting package (UPW) to treat the dry cells. The results show sensitivity to the change of the Kx value for the major groundwater discharge flow. Only abo
... Show MoreThe power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha
... Show More