Preferred Language
Articles
/
yxgTr5gBVTCNdQwCG8Bm
Structural Interpretation of Najaf Basin Using the Magnetic and Gravity Data, Central Iraq
...Show More Authors

Potential data interpretation is significant for subsurface structure characterization. The current study is an attempt to explore the magnetic low lying between Najaf and Diwaniyah Cities, In central Iraq. It aims to understand the subsurface structures that may result from this anomaly and submit a better subsurface structural image of the region. The study area is situated in the transition zone, known as the Abu Jir Fault Zone. This tectonic boundary is an inherited basement weak zone extending towards the NW-SE direction. Gravity and magnetic data processing and enhancement techniques; Total Horizontal Gradient, Tilt Angle, Fast Sigmoid Edge Detection, Improved Logistic, and Theta Map filters highlight source boundaries and the lineaments. Furthermore, the potential field was separated into regional and residual fields, and the depth to the tops of basement magnetic sources, faults and other 2D structures was estimated using power spectrum analysis and Source Parameter Imaging methods, respectively. The results show that the studied magnetic low represents a structural local basin developed in the transitional zone and was and still is suffering from many tectonic movements through the geologic time including differential subsidence. The basin is nearly circular with depths ranging from 14 km in the west to 10.5 km in the east, and a central ridge rising to 5.5 km. A two-dimensional forward model along an E-W magnetic profile is presented. The model reveals clear differences in the basement rock types, with weaker magnetic properties in the basin’s center and stronger ones along its edges. The research findings also indicate that the structural action that formed the basin has its effect which extends within the sedimentary cover depths and reaches to its upper formations or near surface formations.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Effect of Temperature and Alcohol on the Determination of Critical Micelle Concentration of Non- Ionic Surfactants in Magnetic Water
...Show More Authors

The determination of critical micelle concentration of selected non-ionic surfactants (Tween 20,40 and 80) have been investigated using magnetic water(MW)as an aqueous medium.Conductometry technique is used to determine critical micelle concentration.The effect of alcohol addition and temperature variation at the range(293.15 -303.15K) are also pursued. It is concluded that the process of micellization is spontaneous and endothermic because of the observed free energy of micellization (ΔGom) , enthalpy change of micellization  (ΔHom), and entropy change of micellization (ΔSom) for the system was also studied.The properties of the non-ionic surfactants were studied, both in absence and presence of

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Feb 17 2012
Journal Name
Smart Materials And Structures
Frequency tuning of piezoelectric energy harvesters by magnetic force
...Show More Authors

View Publication
Scopus (109)
Crossref (99)
Scopus Clarivate Crossref
Publication Date
Wed Jun 15 2022
Journal Name
مجلة كلية الاداب | جامعة بغداد
STRUCTURAL AND TYPOLOGICAL FEATURES OF UNITS OF THE RUSSIAN TERMINOLOGICAL SYSTEM OF THE OIL AND GAS INDUSTRY
...Show More Authors

Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Multi-Sites Multi-Variables Forecasting Model for Hydrological Data using Genetic Algorithm Modeling
...Show More Authors

A two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Geological Journal
Evaluating Machine Learning Techniques for Carbonate Formation Permeability Prediction Using Well Log Data
...Show More Authors

Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To

... Show More
View Publication
Scopus (14)
Crossref (6)
Scopus Crossref
Publication Date
Tue Oct 07 2025
Journal Name
The Iraqi Journal For Information And Documentation Studies
The role of performance indicators in evaluating the performance of the University of Technology's Central Library
...Show More Authors

University libraries seek to evaluate their performance in order to correct their path and adjust it in the right direction. Therefore, they use (performance indicators), which are a tool used by institutions to evaluate the weaknesses and strengths in their work and the reasons for failure to achieve some goals sometimes. They convert (goals, procedures and actions) into a formula that can be measured mathematically, which contributes to the library determining the gap between its current performance and what those libraries are supposed to be on, clarifying the path that the library is following, controlling the risks that may befall it, and thus enhancing the process of continuous improvement to avoid areas of failure and weakness becaus

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 27 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Isolation, Structural Characterization and Identification of Major Constituents in Ephedra foliata Naturally Growing in Iraq by TLC, GC-MS and UPLC-ESI-MS/MS
...Show More Authors

Abstract:

   The aerial part of Ephedra foliata Family Ephedraceae have long been used in traditional medicine and now Ephedra species have medicinal, ecological, and commercial value. The variety of pharmacological actions of this plant is due to its chemical constituents. Ephedrine and
related alkaloids; are the newly potential medicinal value of Ephedra supplements for weight loss or performance improvement. Other pharmacological actions like antibacterial and antifungal effects of the phenolic acid compounds, the immunosuppressive action of the polysaccharides, and the antitumor action of flavonoids. The genus of this plant wildly distributed t

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref