This study focused on determining the stratigraphic phenomena of the sequences of the Kirkuk group, within the Tertiary age, in the study area at the Buzurgan oil field within the Maysan governorate. In addition to various seismic lines from the completed seismic survey of the study region, data from the Buzurgan oil field wells was utilized. The stratigraphic interpretation results showed that the seismic sections of the Kirkuk Group formations are deposited in the form of a sigmoid configuration through the continuous deposition of shallow-shelf carbonates. Periodic rises in sea level led to episodes of deeper-water sedimentation, including shelf and shelf margin facies. Clastic (sandstone) was deposited as the sea receded fro
... Show MoreThe primary objective of the current paper is to suggest and implement effective computational methods (DECMs) to calculate analytic and approximate solutions to the nonlocal one-dimensional parabolic equation which is utilized to model specific real-world applications. The powerful and elegant methods that are used orthogonal basis functions to describe the solution as a double power series have been developed, namely the Bernstein, Legendre, Chebyshev, Hermite, and Bernoulli polynomials. Hence, a specified partial differential equation is reduced to a system of linear algebraic equations that can be solved by using Mathematica®12. The techniques of effective computational methods (DECMs) have been applied to solve
... Show MoreDespite the enormity of the tragedy, many cases can be saved in record time after accessing them and direct intervention. However, rescue teams may find intervention impossible or dangerous, mainly when major explosions or fires occur. After a disaster, commercial drones can be used to detect and search for survivors. They are controlled by iOS-installed Head Mounted Display (HMD) and virtual reality applications. This enables them to reach disaster areas, detect the presence of injured people, and pinpoint their locations. In this research, Artificial intelligence technologies, as represented by (Open CV Documentation) using PYTHON Code, are combined with Drone engineering capabilities to present robust virtual reality applicat
... Show MoreIn this work, the detection of zinc (Zn) ions that cause water pollution is studied using the CSNPs- Linker-alkaloids compound that was prepared by linking extracted alkaloids from Iraqi Catharanthus roseus plant with Chitosan nanoparticles (CSNPs) using maleic anhydride. This compound is characterized by an X-ray diffractometer (XRD) which shows that it has an orthorhombic structure with crystallite size in the nano dimension. Zeta Potential results show that the CSNPs-Linker-alkaloids carried a positive charge of 54.4 mV, which means it possesses high stability. The Fourier transform infrared spectroscopy (FTIR) shows a new distinct band at 1708.93 cm-1 due to C=O esterification. Scanning electron microscope (SEM)
... Show MoreIn this paper, a new modified variational iteration method (MVIM) with a genetic algorithm has been applied for solving nonlinear partial differential equations. Therefore, a new correction function through an auxiliary parameter that makes sure the convergence of the standard method and improved results by using genetic techniques are introduced. The standard variational iteration method (VIM) is first applied to solve numerically the system of two-dimensional coupled Burgers' equations. Then an improvement on this method is done. Numerical experiments have been conducted to demonstrate the efficiency and high-order accuracy of this method. The algorithm converges readily which yields correct solutions. Better accuracy in comparison w
... Show MoreDue to the rapid development of digital communication systems, information security is now essential for both the storage and exchange of data. Security has become a key research axis as a result of the rapid evolution of network technologies. The transmission of digital data is necessary for various forms of communication. Particularly in applications requiring a high level of security, like surveillance applications, military applications, biometric applications, and radar applications, where this transmission should be secure. Thus, data is normally encoded through the technique of encryption to prevent unauthorized access. The current imperative is for cyber security to guarantees the integrity and confidentiality o
... Show MoreThe Non-thermal plasma has a wide range of applications in different areas. In this study, the oxidation of a model fuel containing organo-sulfur compounds (benzothiophene and dibenzothiophene) was investigated using plasma. The process involved ozone generation through dielectric barrier discharge, followed by extraction using acetonitrile. The results demonstrated the efficient oxidation and removal of dibenzothiophene and benzothiophene by non-thermal plasma. The desulfurization efficiency reached 93.78% under the optimum conditions, including a voltage of 11Kv, temperature of 50ºC, duration of 4 hours, and a flow rate of 75 ml/min.
The Tigris River is the most significant source of water in Iraq. Iraq has been through periods of drought due to climate change and numerous water infrastructure projects that were carried out in the Tigris Basin of Turkey. Four sites have been selected for environmental pollution evaluation, the impact of climate change on the hydrochemistry of the Tigris River, and an estimate of the relationship between dissolved loadings and discharges (m3/s). Data includes Tigris River discharge and hydrochemical analysis: major ions such as (Ca, Mg, Na, K, Cl, SO4, and HCO3), minor ions (NO3 and PO4), trace elements, and biological parameters (BOD5, C.O.D., E-Coli Bacteria,
... Show MoreThe current study was conducted to investigate Annona fruit pulp effects on the levels of various physiological biomarkers linked with insulin-dependent diabetes mellitus after disease induction in mice, as well as indications of oxidative stress and male hormones. The rats were separated into four groups, three of which were given Alloxan (90 mg/kg body weight) to induce diabetes, while the fourth served as a negative control. The first group of diabetic mice received no therapy, the second received metformin (600 mg/kg body weight) and the third received Annona fruit puree. The mice were sacrificed at the end of the experiment, to acquire blood and tissue samples from the liver, kidneys and spleen. T
... Show MoreIn this work we introduce new subclasses of meromorphic functions in punctured unit disk and analyzes numerous connections and various features of these subclasses by making use of the linear operator that is connected to Gaussian hypergeometric functions.
In this paper, we present a five-step iterative scheme, at the beginning, it seems complicated and difficult to implement, but in fact it’s not. This scheme is constructed for - firmly nonexpansive mappings in modular function spaces. Two different -convergences result has been proved for double schemes under consideration. In our study there is a comparison between these cases through answering the question "which one is faster?” Finally, numerical examples are given by using MATLAB software program.
Recently, Deep Learning (DL) has been used in a new technology known as the Deep Dream (DD) to produce images that resemble dreams. It is utilized to mimic hallucinations that drug users or people with schizophrenia experience. Additionally, DD is sometimes incorporated into the images as decoration. This study produces DD images using two deep-CNN model architectures (Inception-ResNet-V2 and Inception-v3). It starts by choosing particular layers in each model (from both lower and upper layers) to maximize their activation function, then detect several iterations. In each iteration, the gradient is computed and then used to compute loss and present the resulting images. Finally, the total loss is presented, and the final deep
... Show MoreIn this paper, we study some new types of soft separation axioms called soft strongly Ƅ*-separation axioms. We show that, the properties of soft strongly Ƅ*-T_i space (i =0, 1,2) are soft topological properties under the bijection, soft irresolute and soft continuous mapping. Furthermore, the property of being soft strongly Ƅ*-regular and soft strongly Ƅ*-normal are soft topological properties under bijection, soft continuous functions. Moreover, their relationships with existing spaces are studied.
Durah power plant (DPP) ash acute toxicity estimation was done by exposing Cladoceran Pleuroxus hamulatus Birge, 1910 to different ash concentrations. Thus, this study was regarded as pioneering by evaluating these effluents' harmful effects on the chosen laboratory food chain individuals. The LC50 of ash on P. hamulatus were 0.04, 0.02 and 0.01 ppt during 24, 48 and 72 hr. respectively. On the other hand, our result showed that the increase in the ash concentrations leads to the maximum increase in mortality percentages value. Additionally, there were some clear behavioral changes seen in the animals, including slowness at first, followed by settling on the bottom of the beakers with stopped th
... Show MoreThe study aims to determine the concentrations of major oxides and trace elements in the soil of East Baghdad oil field. Twenty-five soil samples were collected, 24 samples from the East Baghdad oil field and one sample was taken from Diyala governorate, far away from pollution resources (BA). The samples were analysed using X-ray fluorescence (XRF), and the result showed that SiO2 and CaO are the most abundant, followed by other oxides (Na2O, Al2O3, Fe2O3, MgO, K2O, TiO2) with a high percentage of LOI. Trace elements showed that the average values of (Cd, Co, Cr, Cu, Mn, Ni, Pb, Sr, V, Zn ) were above the international limits of the soil except for the
... Show MoreToday in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%, resp
... Show MoreThe wireless sensor network (WSN) is one of the most important achievements of the modern technological revolution and greatly affects human life. These networks suffer from some limitations that affect their performance, such as the limited power of their devices. Clustering technology is one of the effective power conservation techniques that improves the performance of WSNs, so this article focuses on developing aggregation technology by proposing an Energy Saving, Multi-hops, Clustering, and Hierarchy (ESMCH) protocol for homogeneous WSNs. The proposed protocol improves clustering technology in several directions. The first direction is by determining the ideal number of cluster head nodes (CHs) suitable for the network, and the se
... Show MoreIn order to examine various geometric features, we expanded the supertrigonometric function (STF) and superhyperbolic function (SHF) into the open unit disk. A convolution differential operator of the STF provides the formulas. The suggested operator works with both integral and double differential inequalities. As a result, we present a collection of findings that includes recent works. The idea of
subordination and superordination serves as a guide for our method, and we then developed the primary conclusion as a double side’s theorem.
Schizophrenia poses a considerable disease burden, notwithstanding its relatively low incidence rate. The escalation in population size and mean age has led to a substantial rise in the incidence of illness linked to schizophrenia, particularly in countries with moderate levels of prosperity. Therefore, it is necessary to find a way to detect and recognize the illness as fast as possible to stop the consequences from occurring and stop symptoms from appearing before they even start. Within this study’s scope, fifteen distinct primers were selected randomly to determine whether or not they could recognize schizophrenia. To accomplish this, a Randomly Amplified Polymorphic DNA-polymerase chain reaction (RAPD-PCR) was conduct
... Show MoreDetecting and subtracting the Motion objects from backgrounds is one of the most important areas. The development of cameras and their widespread use in most areas of security, surveillance, and others made face this problem. The difficulty of this area is unstable in the classification of the pixels (foreground or background). This paper proposed a suggested background subtraction algorithm based on the histogram. The classification threshold is adaptively calculated according to many tests. The performance of the proposed algorithms was compared with state-of-the-art methods in complex dynamic scenes.
Water shortage is one of the serious environmental problems in a semi-arid region, which has become increasingly dangerous. The article considers a new management simulation model of Groundwater (GW) resources using a water flow model. One thousand one hundred fifty irrigation wells were selected as a study area using Landsat 8 OLI images 2016-2021 in the West of Karbala province, Iraq. Geographic Information System tool integrated with numerical /conceptual model using the Visual MODFLOW Flex 7 software to reach the optimal use of GW resources. The conceptual model indicated that the value of the flow in the aquifer reaches 21 million cubic meters annually, which means there is renewable storage. The consumer value of GW was ab
... Show MoreThe analysis of thermal instability in a Brinkman-Darcy Jeffrey nanofluid flow through a porous medium is studied in this paper. The nanoparticles are immersed in the Jeffrey fluid so that the thermal conductivity of the system is maintained and high medium porosity is to be undertaken. Under the impact of the Jeffrey, nanoparticles and Brinkman-Darcy parameters, the momentum-balance equations of fluid flow are mutated. The dispersion relation for the Rayleigh number is derived by employing the normal mode analysis method and linear stability theory in terms of different parameters affecting the stability of the system. It is noticed that the Darcy-Brinkman number advances the convection while the Jeffrey parameter postpones
... Show MoreThe study area is located in the Missan government in southeastern Iraq, including oilfields (Halfaya, Noor, and Amara). The study area is about 966 Km2. Based on the 2D seismic reflection interpretation, well-logs data (sonic and estimated density logs), and synthetic seismogram of well Am-2, two horizons were identified and picked (Nahr Umr and Shuaiba) within the Lower Cretaceous age. For the picked reflectors, two-way time and depth maps were created to display the subsurface's structural makeup. The structural interpretation shows two structural axes in the study area. The first is the Halfaya-Amara axis, whose direction is WNW-ESE corresponding with the Amara structure. This axis deviates southeast due to the tect
... Show MoreIn this study, rock stability has been assessed to pinpoint the critical factors affecting slope instability. The discontinuity data collected during the field surveys was evaluated using stereograph projection. Bai Hassan, Mukdadiya, and Injana Formations that were exposed in the research region show slope collapses, ranging in severity from most to least in terms of secondary toppling and rock fall. The characteristics of the rock discontinuities determine the kind and extent of hazards. According to this study, warning signs and fencing should be used to prevent people from walking along the edges of the slopes in the Bajalia anticline and the areas around to alert them of potential failure threats.
In humans, the hepatitis B virus (HBV) has been demonstrated to be the essential cause of both acute and chronic hepatitis. A variety of cytokines are released as a part of the immune response during HBV infection. The present study aimed to estimate the interleukin-33(IL-33) and tumor necrosis factor-α (TNF-α) in patients with chronic hepatitis B virus (CHBV). This study involved fifty diagnosed CHBV patients (mean age 47.26 ± 14.23) and forty subjects as healthy control (mean age 35.10 ± 9.86). The results revealed by the ELISA method that the serum levels of IL-33and TNF-α were significantly higher (P-value <0.001) in the CHBV patients group (78.12 pg/ml and 15.34 pg/ml respectively) as compared with
... Show MoreBackground Whatman™ FTA (Flinders Technology Associates) is a form of card soaked in chemicals that denatures proteins while protecting DNA and ensuring the safe handling of dried body fluid spots (blood, semen, and saliva) and buccal cells. To this day, these cards are still infrequently used in forensic science. Therefore, reference samples including biological material may be collected on FTA cards for genetic analysis that have been widely used for DNA preservation and analysis, particularly in forensic sciences and genetic studies. The goal of the study was to evaluate the effects of cryopreservation on DNA quantitative and short tandem repeats (STR) profiling by compar
... Show MoreSystemic Lupus Erythematosus (SLE) is a chronic systemic autoimmune disease with multiple contributing factors. It is characterized by the immune system's inability to tolerate autoantigens such as nuclear antigens. The objective of this study is to evaluate the expression of microRNA-34a in relation to the incidence and occurrence of SLE in Iraqi women using quantitative real-time PCR and to determine its potential relationship with various demographic and laboratory parameters and disease activity. This investigation enrolled 100 healthy controls with a mean age of 31.68 years and 100 SLE patients, all of whom were women with a mean age of 32.85 years and a disease duration of 9.00 (6.75) years. The mean of the Systemic Lu
... Show MoreSeveral desirable properties of silver nanoparticles (AgNPs) have found extensive use in consumer and healthcare products. Due to their potential to penetrate the nucleus and harm genetic material, their adverse effects, however, are mostly unknown and appear inevitable. This study aimed to determine genotoxic potential of AgNPs using mitotic index (MI) and structural chromosome aberrations (SCA) test in bone marrow cells of Mus musculus male albino mice. Two generations were experimented in this study, the first and second generation. In the first generation, five groups of five male mice including control group were used and intraperitoneally (IP) injected with two doses of AgNPs (50 mg/kg and 150mg/kg) in one-time and
... Show MoreThe Internet of Things and the blockchain are considered to be the major technologies that are linked together to support the flexibility, scalability, and integrity of the system. IoT devices have insufficient computing capacity in terms of processing data units and storage requirements. It requires efficient encryption algorithms. Nowadays, the IoT is facing several challenges, such as poor
interoperability, security vulnerabilities, privacy, and a lack of industry standards. In this paper, a novel triple DES-based blockchain algorithm for the IoT network environment is designed to assure data integrity and system scalability. Initially, the IoT network modeling is framed with different network entities, smart devices, and communi
Klebsiella pneumoniae is a pathogenic bacterium that has been linked to several illnesses acquired in both the community and hospitals. This study aimed to determine the prevalence of the clbA, K1, and K2 genes in K. pneumoniae and their relationship with antibiotic resistance. In this research, 130 clinical samples from patients in hospitals were collected from blood, urine, wounds, burns, and sputum, and only 61 of those samples were positively identified as K. pneumoniae using biochemical tests, selective media, and Vitek II. The method of disc diffusion was utilized to evaluate the 61 isolates' susceptibility to 10 antibiotics, including Imipenem, Meropenem, Cefixime, Ceftazidime, Amoxicil
... Show More