This research had been achieved to identify the image of the subsurface structure representing the Tertiary period in the Galabat Field northeast of Iraq using 2D seismic survey measurements. Synthetic seismograms of the Galabat-3 well were generated in order to identify and pick the reflectors in seismic sections. Structural Images were drawn in the time domain and then converted to the depth domain by using average velocities. Structurally, seismic sections illustrate these reflectors are affected by two reverse faults affected on the Jeribe Formation and the layers below with the increase in the density of the reverse faults in the northern division. The structural maps show Galabat field, which consists of longitudinal Asymmetrical narrow anticline of Fatha and Jeribe formations, where the Southeastern limb is steeper than the Northeastern limb. The seismic interpretation shows that Galabat Field has a positive inverted structure, it is an anticline at the level of the Tertiary Period. The direction of the anticline axis and the major reverses faults are Northwest -Southeast. It is concluded from the study that reverse faults originated due to Zagros tectonism which is widespread in the area are a major conduit that channeled petroleum flow from source to Miocene traps. In addition, these faults were caused by the presence of salt accumulation within the Fatha Formation and led to high variation in the thickness in the crest and limbs of the Galabat structure.
Measuring the efficiency of postgraduate and undergraduate programs is one of the essential elements in educational process. In this study, colleges of Baghdad University and data for the academic year (2011-2012) have been chosen to measure the relative efficiencies of postgraduate and undergraduate programs in terms of their inputs and outputs. A relevant method to conduct the analysis of this data is Data Envelopment Analysis (DEA). The effect of academic staff to the number of enrolled and alumni students to the postgraduate and undergraduate programs are the main focus of the study.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreSoftware-Defined Networking (SDN) has evolved network management by detaching the control plane from the data forwarding plane, resulting in unparalleled flexibility and efficiency in network administration. However, the heterogeneity of traffic in SDN presents issues in achieving Quality of Service (QoS) demands and efficiently managing network resources. SDN traffic flows are often divided into elephant flows (EFs) and mice flows (MFs). EFs, which are distinguished by their huge packet sizes and long durations, account for a small amount of total traffic but require disproportionate network resources, thus causing congestion and delays for smaller MFs. MFs, on the other hand, have a short lifetime and are latency-sensitive, but they accou
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
The problem of this study lies in that NATO was formed in the first place to protect Europe from Warsaw Pact. The geographical and military strategy have been changed with the change of its mission and expanding its operation scope with the leadership of the USA in the international scens. The latter has made this organization as the military arm to tighten its control over strategic regions.
The research supposes that NATO state members confront security concerns and political and military issues that push to expand the organization. The importance of this study lies in knowing the new roles of NATO imposed by the United States. Therefore, the continuity and affi
... Show MoreThe study deals with China's soft power and diplomacy in the Middle East, and it focuses specifically on the tools and foundations of China's soft diplomacy and how it achieves its goals in the region in addition to its challenges in the region. In this regard, the study also focuses on the Chinese Belt and Road Initiative and its soft foundations and how they serve China’s diplomacy and soft power in the region. The study ends with a set of conclusions, perhaps the most prominent of which is that diplomacy and soft power have become a fundamental pillar of China's foreign policy to achieve its foreign goals and to establish an international system compatible with China's principles. As for the Middle East, China has established a poli
... Show MoreTo reduce solar radiation transmittance into buildings through windows facing east or west during summer, a window inclination from vertical position is suggested. The inclination of the window glazing and the rate of unwanted solar radiation during summer can be calculated knowing the dialy inclination of the sun rays. The inclination of window glazing depends on the latitude of the position required. For instance in Baghdad which is at about 33o north latitude a slope of 15o for window glazing is sufficient to prevent about 419 MJ/m2 of total solar radiation energy from penetration during summer for clear glazing of window facing east. This value drops to about 96 MJ/m2 during winter. Therefore the ratio between the energy saved for co
... Show MoreRoad-side dust samples were collected during August in 2020 from selected areas of, Al-Rusafa, Baghdad, Iraq. A sedimentological and mineralogical analysis of street dust was conducted. Three areas were selected to study street dusts which are Al-Baladitat, Al-Obaidi and Ziona. The laboratory analyses were done in the Department of Geology, College of Science, University of Baghdad. The heavy metal contents were determined in the roadside dust using XRF Method. It was found that the dust is of muddy texture, and is believed to be transmitted with the various storms blowing on Baghdad or by the wheels of Cars. The results of mineralogical investigation revealed that the dust samples composed of quartz, feldspar, calcite, gypsum and s
... Show MoreA political perusal of Initiations in Declaring Middle East a District vacant of mass Destruction weapons
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show More