Potential data interpretation is significant for subsurface structure characterization. The current study is an attempt to explore the magnetic low lying between Najaf and Diwaniyah Cities, In central Iraq. It aims to understand the subsurface structures that may result from this anomaly and submit a better subsurface structural image of the region. The study area is situated in the transition zone, known as the Abu Jir Fault Zone. This tectonic boundary is an inherited basement weak zone extending towards the NW-SE direction. Gravity and magnetic data processing and enhancement techniques; Total Horizontal Gradient, Tilt Angle, Fast Sigmoid Edge Detection, Improved Logistic, and Theta Map filters highlight source boundaries and the lineaments. Furthermore, the potential field was separated into regional and residual fields, and the depth to the tops of basement magnetic sources, faults and other 2D structures was estimated using power spectrum analysis and Source Parameter Imaging methods, respectively. The results show that the studied magnetic low represents a structural local basin developed in the transitional zone and was and still is suffering from many tectonic movements through the geologic time including differential subsidence. The basin is nearly circular with depths ranging from 14 km in the west to 10.5 km in the east, and a central ridge rising to 5.5 km. A two-dimensional forward model along an E-W magnetic profile is presented. The model reveals clear differences in the basement rock types, with weaker magnetic properties in the basin’s center and stronger ones along its edges. The research findings also indicate that the structural action that formed the basin has its effect which extends within the sedimentary cover depths and reaches to its upper formations or near surface formations.
The determination of critical micelle concentration of selected non-ionic surfactants (Tween 20,40 and 80) have been investigated using magnetic water(MW)as an aqueous medium.Conductometry technique is used to determine critical micelle concentration.The effect of alcohol addition and temperature variation at the range(293.15 -303.15K) are also pursued. It is concluded that the process of micellization is spontaneous and endothermic because of the observed free energy of micellization (ΔGom) , enthalpy change of micellization (ΔHom), and entropy change of micellization (ΔSom) for the system was also studied.The properties of the non-ionic surfactants were studied, both in absence and presence of
... Show MoreA two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreMachine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To
... Show MoreUniversity libraries seek to evaluate their performance in order to correct their path and adjust it in the right direction. Therefore, they use (performance indicators), which are a tool used by institutions to evaluate the weaknesses and strengths in their work and the reasons for failure to achieve some goals sometimes. They convert (goals, procedures and actions) into a formula that can be measured mathematically, which contributes to the library determining the gap between its current performance and what those libraries are supposed to be on, clarifying the path that the library is following, controlling the risks that may befall it, and thus enhancing the process of continuous improvement to avoid areas of failure and weakness becaus
... Show MoreAbstract:
The aerial part of Ephedra foliata Family Ephedraceae have long been used in traditional medicine and now Ephedra species have medicinal, ecological, and commercial value. The variety of pharmacological actions of this plant is due to its chemical constituents. Ephedrine and
related alkaloids; are the newly potential medicinal value of Ephedra supplements for weight loss or performance improvement. Other pharmacological actions like antibacterial and antifungal effects of the phenolic acid compounds, the immunosuppressive action of the polysaccharides, and the antitumor action of flavonoids. The genus of this plant wildly distributed t