An α-fractional integral and derivative of real function have been introduced in new definitions and then, they compared with the existing definitions. According to the properties of these definitions, the formulas demonstrate that they are most significant and suitable in fractional integrals and derivatives. The definitions of α-fractional derivative and integral coincide with the existing definitions for the polynomials for 0 ≤ α < 1. Furthermore, if α = 1, the proposed definitions and the usual definition of integer derivative and integral are identical. Some of the properties of the new definitions are discussed and proved, as well, we have introduced some applications in the α- fractional derivatives and integral
... Show MoreIn this work, we present new types of compact and Lindelöf spaces and some facts and results related to them. There are also types of compact and Lindelöf functions and the relationship between them has been investigated. Further, we have present some properties and results related to them.
In this work, combining acyclovir with ciprofloxacin (CCP), a new Schiff base and its metal complexes with iron (III), manganese (II), copper (II), zinc (II), and calcium (II) ions are synthesized and structurally characterized by XRD, SEM, 1H NMR, 13C NMR, FT-IR, and UV-Visible spectral techniques. Furthermore, molecular docking studies were carried out, and the complexes were tested to resolve any potential hang-ups in opposition to the Herpes virus and DFT calculation studies. In addition, the metal complexes and ligand were screened against antibacterial strains of one gram-positive bacteria (Staphylococcus aureus) and three gram-negative bacteria (
... Show MoreThis work highlights the estimation of the Al-Khoser River water case that disposes of its waste directly into the Tigris River within Mosul city. Furthermore, the work studies the effects of environmental and climate change and the impact of pollution resulting from waste thrown into the Al-Khoser River over the years. Al-Khoser River is located in the Northern Mesopotamia of Mosul city. This study aims to detect the polluted water area and the polluted surrounding area. Temporal remote sensing data of different Landsat generations were considered in this work, specifically Enhanced Thematic Mapper Plus of 2000 and Operational Land Imager of 2015. The study aims to measure the amount of pollution in the study area over 15 years
... Show MoreIn this research, the eccentricity will be calculated as well as the best height of satellite orbit that can used to transfer from that orbit around the Earth to construct an interplanetary trajectory, for example Mars, when the transfer can be accomplished by a simple impulse, that means the transfer consists of an elliptical orbit from the inner orbit (at a perigee point) to the outer orbit (at apogee point). We will determine Keplerian equation to find the value of a mean anomaly(M) by Rung-Cutta method.
There are several types of satellites orbits around the Earth, but by this study, we find that the best stable orbit to the satellite that is used to inter its orbit around Mars is the Medium Earth Orbit (MEO) at a hei
... Show MoreThe ground state density distributions and electron scattering Coulomb form factors of Helium (4,6,8He) and Phosphorate (27,31P) isotopes are investigated in the framework of nuclear shell model. For stable (4He) and (31P) nuclei, the core and valence parts are studied through Harmonic-oscillator (HO) and Hulthen potentials. Correspondingly, for exotic (6,8He) and (27P) nuclei, the HO potential is applied to the core parts only, while the Hulthen potential is applied to valence parts. The parameters for HO and Hulthen are chosen to reproduce the available experimental size radii for all nuclei under study. Finally, the CO component of electron scattering charge fo
... Show MoreCoronavirus is considered the first virus to sweep the world in the twenty-first century, it appeared by the end of 2019. It started in the Chinese city of Wuhan and began to spread in different regions around the world too quickly and uncontrollable due to the lack of medical examinations and their inefficiency. So, the process of detecting the disease needs an accurate and quickly detection techniques and tools. The X-Ray images are good and quick in diagnosing the disease, but an automatic and accurate diagnosis is needed. Therefore, this paper presents an automated methodology based on deep learning in diagnosing COVID-19. In this paper, the proposed system is using a convolutional neural network, which is considered one o
... Show MoreThis paper calculated the Duration Magnitude (MD) equation using data from the Iraqi Meteorological Organization and seismology (IMOS). It is an empirically determined equation and expressed as:
The epicentral distance and local geological conditions affect the duration of the coda. The data is obtained from 7 seismic stations in the network. The new proposed duration magnitude equation results from applying linear regression analysis to the data of a seismic signal duration with correlation coefficient R2=0.76; and a standard deviation value of 0.049. Station corrections indicated by Sc are also specified for the seismic stations that range from -0.024 to + 0.02.
The current study looked into heavy metal poisoning of the Euphrates river which runs from Al-Kifl to Kufa in Iraq. One of the goals of this research was to determine the pollution levels and the contamination sources. We looked at six heavy metal (Cd, Pb, Zn, Cr, Fe, and Mn) characteristics in sediment, taking samples from six sites along the Euphrates every season from March 2020 to January 2021. To assess pollution levels, three indices were chosen: enrichment factor (EF), geo-accumulation index (I-geo) and contamination factor (CF). According to EF, the Cd and Pb elements recorded considerable enrichment, very high enrichment and extremely high pollution at practically all sites in four seasons, while the remainder of the HMs recorde
... Show MoreModern ciphers are one of the more difficult to break cipher systems because these ciphers high security, high speed, non - propagation error and difficulty in breaking it. One of the most important weaknesses of stream cipher is a matching or correlation between the output key-stream and the output of shift registers.
This work considers new investigation methods for cryptanalysis stream cipher using ciphertext only attack depending on Particle Swarm Optimization (PSO) for the automatic extraction for the key. It also introduces a cryptanalysis system based on PSO with suggestion for enhancement of the performance of PSO, by using Simulated Annealing (SA). Additionally, it presents a comparison for the cryptanal
... Show MoreNi2O3 nanomaterial, a phase of nickel oxide, is synthesized by a simple chemical process. The pure raw materials used in the present process were nickel chloride hexahydrate NiCl2.6H2O and potassium hydroxide KOH by utilizing temperature at 250 oC for 2 hour. The structural, morphological and optical properties of the synthesized specimens of Ni2O3 were investigated employing diverse techniques such as XRD, AFM, SEM and UV-Vis, respectively. The XRD technique confirms the presence of Ni2O3 nanomaterial with crystal size of 57.083 nm which indexing to the (2θ) of 31.82; this results revealed the Ni2O3 was a ph
... Show MoreThe aim of the present study is to estimate the levels of some essential and non-essential metals content of soil and seven leafy vegetable species, in the field 30m away from the Al-Qanat highway in Baghdad using X-ray fluorescence analysis. The results showed that soil and leafy vegetables had higher levels of macro elements, and that Ca in rocket and purslane was the highest. The average content of trace elements in soil and leafy vegetables has been close to the minimum than the range of permissible limits recommended by WHO and FAO/WHO except Fe, Cr and Ni in soil have exceeded the concentration of the threshold limit (13728.8 mg/kg Dw for Fe, 183.361mg/kg Dw for Cr, and 124.01mg/kg Dw for Ni) value as well for leafy vege
... Show MoreThis study observed the formation of struvite crystals in wastewater using natural zeolite activated with Mg2+ ions. Mg2+ ions released from natural zeolite would react with PO43- and NH4+ ions from in wastewater to form struvite crystals. The results showed that at pH 8.5, the removal of PO43- and NH4+ ions was more effective using the modified zeolite than the natural zeolite. Adding 40 g/L Zeo-Mg (1) produced the best results, with PO43- (93.32%) and NH4 (40%) adsorption. Meanwhile, 40g/L Zeo-Mg (2) adsorbed 81% PO43- ions and 27.12% NH4+ ions. The eqil
... Show MoreThe aim of this article is to present the exact analytical solution for models as system of (2+1) dimensional PDEs by using a reliable manner based on combined LA-transform with decomposition technique and the results have shown a high-precision, smooth and speed convergence to the exact solution compared with other classic methods. The suggested approach does not need any discretization of the domain or presents assumptions or neglect for a small parameter in the problem and does not need to convert the nonlinear terms into linear ones. The convergence of series solution has been shown with two illustrated examples such (2+1)D- Burger's system and (2+1)D- Boiti-Leon-Pempinelli (BLP) system.
The Water Quality Index (WQI) is an important parameter in describing the water resources' suitability for human uses and is one of the most effective methods of describing water quality and indicative of assessing water quality and suitability for human utilization and the health of ecosystems. WQI of the Canadian Council of Ministers of the Environment (CCME) was used in the study to describe the Shatt al-Arab water quality in Basrah Southern Iraq, and its suitability for drinking use. The data for analyzing river water samples were adopted from five stations along the river every month during the years from 2014 to 2018 by the Iraqi Ministry of Environment, as it included the measurement of acidity function PH, Dissolved Oxyg
... Show MoreBone metastases are the main reason for death in males suffering from advanced prostate cancer. This study aimed to create zoledronic acid and graphene oxide conjugation for anticancer therapy. The process of conjugation was confirmed by several characterization methods including UV-VIS spectrophotometry, Fourier Transform Infrared Spectroscopy (FTIR), and atomic force microscope (AFM). the cytotoxicity of 400, 600, and 800 μg/ml to each GO, ZOL, and ZOL-GO was evaluated on a human hepatic cell line (WRL 68) and human prostate cancer cell line (PC3) using an MTT assay. The antitumor mechanisms of ZOL-GO were examined by cell cycle analysis. The results demonstrated That ZOL-GO caused a reduction in the cell viability of WRL 68
... Show MoreThe Gray Wolf Optimizer (GWO) is a population-based meta-heuristic algorithm that belongs to the family of swarm intelligence algorithms inspired by the social behavior of gray wolves, in particular the social hierarchy and hunting mechanism. Because of its simplicity, flexibility, and few parameters to be tuned, it has been applied to a wide range of optimization problems. And yet it has some disadvantages, such as poor exploration skills, stagnation at local optima, and slow convergence speed. Therefore, different variants of GWO have been proposed and developed to address these disadvantages. In this article, some literature, especially from the last five years, has been reviewed and summarized by well-known publishers. Fir
... Show MoreLand surface temperature (LST) is crucial for determining the region's environmental quality because a significant temperature rise causes disasters, which cause environmental imbalance, reducing biodiversity and hastening desertification. In this study, remote sensing and geographic information systems were used to estimate the change in the LST of Babylon, Iraq, using two satellite images taken 20 years apart (2002, 2022). The temperature was extracted using a specific mathematical model in ArcMap10.8 software. The findings demonstrated a significant variation in temperatures and the concentration in various regions of Babylon between 2002 and 2022 and the relationship between LST and Normalized difference
... Show MoreCopyright hacking and piracy have increased as the Internet has grown in popularity and access to multimedia material has increased. Security, property protection, and authentication have all been achieved via watermarking techniques. This paper presents a summary of some recent efforts on video watermarking techniques, with an emphasis on studies from 2018 to 2022, as well as the various approaches, achievements, and attacks utilized as testing measures against these watermarking systems. According to the findings of this study, frequency-domain watermarking techniques are more popular and reliable than spatial domain watermarking approaches. Hybrid DCT and DWT are the two most used techniques and achieve good results in the fi
... Show MoreA key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show MoreThe purpose of this study is to investigate the effect of an elastic wall on the peristaltic flow of Williamson fluid between two concentric cylinders, where the inner tube is cylindrical with an inelastic wall and the outer wall is a regular elastic sine wave. For this problem, cylindrical coordinates are used with a short wavelength relative to channel width for its length, as well as the governing equations of Williamson fluid in the Navier-Stokes equations. The results evaluated using the Mathematica software program. The Mathematica program used by entering the various data for the parameters, where the program shows the graphs, then the effect of these parameters became clear and the results mentioned in the conclusion. Williamso
... Show MorePredicting the visibility of the lunar crescent drew great attention during the Middle Ages, especially among Muslims, because the dates of religious practices in Islam and calendars, in addition to being aware of the motion of the moon in its orbit, are based on the lunar month.
This paper aims to study the development of crescent visibility criteria from ancient times through the medieval period to the modern update. Some basics and astronomical terms related to crescent visibility are presented and then a comprehensive view of crescent visibility criteria is examined by surveying about 54 published research papers related to the issue of crescent visibility. Each research paper is summarized, classified, and the re
... Show MoreThis paper aims to early study of detection and diagnosis of kidney tumors and kidney stones using Computed Tomography Scanning CT scan images by digital image processing. Computerized Axial Tomography (CAT) is a special medical imaging technique that provides images with 3D, including much information about the body's construction consisting of bones and organs. A C.T scan uses X-rays to create cross-sectional images of the body and gives the doctor a full explanation of the diagnosis of the situation through the examination. It has been used in five cases of kidney images, including healthy, stones, tumors (cancer), cystic and renal fibrosis. The masking procedure is used to separate the required C.T. images
... Show MoreDue to the lack of vehicle-to-infrastructure (V2I) communication in the existing transportation systems, traffic light detection and recognition is essential for advanced driver assistant systems (ADAS) and road infrastructure surveys. Additionally, autonomous vehicles have the potential to change urban transportation by making it safe, economical, sustainable, congestion-free, and transportable in other ways. Because of their limitations, traditional traffic light detection and recognition algorithms are not able to recognize traffic lights as effectively as deep learning-based techniques, which take a lot of time and effort to develop. The main aim of this research is to propose a traffic light detection and recognition model based on
... Show MoreBaghdad University Radio Telescope (BURT) is a 3 meter radio telescope that was installed in the main campus of the University of Baghdad in Jadiriyah. Radio telescopes, in general, offer a wide range of applications in radio astronomy, which are usually used to detect the neutral hydrogen emission line at a wavelength of 21 cm. One of the key applications of BURT is to observe the Milky Way galaxy and to determine its rotation curve. However, performing such observations requires accurate determination of the appropriate observing time as well as the coordinates. This paper focuses on how the observing time and coordinates are calculated correctly and accurately. The horizontal coordinate that corresponds to the galactic coor
... Show MoreDeep learning techniques allow us to achieve image segmentation with excellent accuracy and speed. However, challenges in several image classification areas, including medical imaging and materials science, are usually complicated as these complex models may have difficulty learning significant image features that would allow extension to newer datasets. In this study, an enhancing technique for object detection is proposed based on deep conventional neural networks by combining levelset and standard shape mask. First, a standard shape mask is created through the "probability" shape using the global transformation technique, then the image, the mask, and the probability map are used as the levelset input to apply the image segme
... Show MoreEngineering project assessment at Al-Muthana Airport in Baghdad, Iraq, has been studied using a 3D electrical resistivity imaging survey. The site investigation is crucial for assessing the future of the region's infrastructures since it reveals the location of buried facilities or weak zones below the surface and measures localized groundwater levels. Wenner-Schlumberger array was used to conduct four parallel 2D electrical resistivity spreads (MU1 to MU4). Each spread line was 100 m in length with 1 m electrode spacing and an average spacing of 9 meters between any two adjacent lines. The depth of the investigation was around 23.8 m. Survey lines were drawn going from northwest to southeast. These spreads were combined to prov
... Show MoreTotal releasing phenolic compounds and allelopathic potential of the three sunflower genotypes Helianthus annuus L. residues were evaluated under open field conditions on weed flora associated with the proposed crops; wheat, broad bean and flax which are cultivated usually after the sunflower crop as successive crops. After getting seed from the sunflower crop. After getting seeds, sunflower plant parts were chopped and incorporated with field soil using a rotavator. Regarding the phenolics, total phenolic compounds released from sunflower residues were increased in-field soil and reached the highest concentration in the fourth week after mixing with soil. Significant suppression of weed flora was observed when the weed
... Show MoreSmishing is a cybercriminal attack targeting mobile Short Message Service (SMS) devices that contains a malicious link, phone number, or email. The attacker intends to use this message to steal the victim's sensitive information, such as passwords, bank account details, and credit cards. One method of combating smishing is to raise awareness and educate users about the various tactics used by SMS phishers. But even so, this method has been criticized for becoming inefficient because smishing tactics are continually evolving. A more promising anti-smishing method is to use machine learning. This paper introduces a number of machine learning algorithms that can be used for detecting smishing. Furthermore, the differences and simil
... Show MoreBai Hassan Oil field is considered one of the important north Iraq oil fields. The giant oil field of Bai-Hassan is located near Kirkuk City in North Iraq. The field consists of two domes (in SE – NW direction) Kithka Dome and Dauod Dome separated by a narrow saddle called Shashal saddle.
The current study is focused on microfacies analysis to interpret the stratigraphic sequence of the Palani Formation (early – lower Oligocene age), Baba, Bajawan and Tarjil Formations (middle Oligocene age).
The Bajawan Formation consists basically of five microfacies easily recognizable throughout the thin section. These microfacies are Lime Mudstone Microfacies, Miliolid Packestone Microfacies, Miliolid Grainstone Microfacie
... Show More