The selection of proper field survey parameters of electrical resistivity can significantly provide efficient results within a reasonable time and cost. Four electrode arrays of 2D Electric Resistivity Imaging (ERI) surveys were applied to characterize and detect subsurface archaeological bodies and to determine the appropriate array type that should be applied in the field survey. This research is to identify the subsurface features of the Borsippa archaeological site, Babylon Governorate, Middle Iraq. Synthetic modeling studies were conducted to determine the proper array and parameters for imaging the shallow subsurface features or targets. The efficiency of many array types has been tested for the detection the buried archaeological artifacts by enhancing the data coverage and sensitivity with minimizing ambiguity, from the observations. The applied arrays are Wenner, Wenner-Schlumberger, Pole-Dipole, and Dipole-Dipole. The simulated synthetic model consists of five shallow artifacts or walls embedded in the proposed silt clayey soil deposits. The models were constructed using the RES2DMOD program, and the Inversion approach was conducted using the RES2DINV program. Data of subsurface resistivity variation were inverted using the robust (i.e., L1-norm) inversion algorithm. The results reflect that the Dipole-Dipole array is recommended for shallow depths investigations, while for greater depths, the Wenner-Schlumberger array is proper to apply. The concluded results were applied in real case studies, to effectively image archaeological bodies, and successfully detecting low resistivity zones at superficial and greater depths. The relatively high resistivity features have been imaged which is probably related to the archaeological features. The results of the investigation provide archaeologists with proper insights for assessing and excavating properly the surveyed part of the Borsippa and any archaeological sites in future work.
With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreObjective: To assess of Science Teachers' Awareness towards Communicable Diseases Control in Baghdad City
Primary Schools
Methodology: A descriptive study was conducted, included (100) primary school, (50) in Al-Rassafa sector, and
(50) in Al-Karkh sector, from March 5th 2012 to March 15th 2013, to assess of science teachers' awareness
towards communicable diseases control. A cluster sample of (100) Science teachers (males and females) were
selected, as one teacher from each school. A questionnaire format was used for data collection. The validity of
questionnaire was estimated through a penal of experts related to the field of study, and its reliability was
estimated through a pilot study conducted in (20) schools (
Background: The purpose of this study was to evaluate the effect of in vitro long-term simulation of oral conditions on the bond strength of PEEK CAD/CAM lingual retainers.
Material and methods: The sample consisted of 12 PEEK CAD/CAM retainers each composed of 2 centrally perforated 3x4mm pads joined by a connector. They were treated by 98% sulfuric acid for 1 minute and then conditioned with Single Bond Universal and bonded to the lingual surface of premolar teeth by 3M Transbond TM System. Half of the retainers were artificially aged using a 30-day water storage and 5000 thermocycling protocol before bond strength testing to compare with the non-aged specimens.
Results: The artificially aged retainers showed a marginally
... Show MoreThis work deals with thermal cracking of heavy vacuum gas oil which produced from the top of vacuum distillation unit at Al- DURA refinery, by continuous process. An experimental laboratory plant scale was constructed in laboratories of chemical engineering department, Al-Nahrain University and Baghdad University. The thermal cracking process was carried out at temperature ranges between 460-560oC and atmospheric pressure with liquid hourly space velocity (LHSV) equal to 15hr-1.The liquid product from thermal cracking unit was distilled by atmospheric distillation device according to ASTM D-86 in order to achieve two fractions, below 220oC as a gasoline fraction and above 220oC as light cycle o
... Show MoreThis paper aims at studying the illocutionary speech acts: direct and indirect to show the most dominant ones in a presidential speech delivered by the USA president. The speech is about the most critical health issue in the world, COVID-19 outbreak. A descriptive qualitative study was conducted by observing the first speech delivered by president Trump concerning coronavirus outbreak and surveying the illocutionary acts: directive, declarative, commissive, expressive, and representative. Searle's (1985) classification of illocutionary speech acts is adopted in the analysis.
What are the main types of the illocutionary speech acts performed by Trump in his speech?; Why does
... Show MoreBackground. After tooth extraction, alveolar bone resorption is inevitable. This clinical phenomenon challenges dental surgeons aiming to restore esthetic and function. Alveolar ridge preservation can be applied to minimize dimensional changes with a new socket grafting material, an autogenous dentin graft, produced by mechanically and chemically processing natural teeth. This study assessed the safety and efficacy of using autogenous dentin biomaterial in alveolar ridge preservation. Materials and Methods. Patients with nonrestorable maxillary anterior teeth bounded by natural sound teeth were included in this study. After a detailed clinical and tomographic examination, eligible participants were randomly allocated into two groups
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More
Early detection of eye diseases can forestall visual deficiency and vision loss. There are several types of human eye diseases, for example, diabetic retinopathy, glaucoma, arteriosclerosis, and hypertension. Diabetic retinopathy (DR) which is brought about by diabetes causes the retinal vessels harmed and blood leakage in the retina. Retinal blood vessels have a huge job in the detection and treatment of different retinal diseases. Thus, retinal vasculature extraction is significant to help experts for the finding and treatment of systematic diseases. Accordingly, early detection and consequent treatment are fundamental for influenced patients to protect their vision. The aim of this paper is to detect blood vessels from
... Show MoreAbstractObjectives: The work environment has an impact on the performance of nurses, as well as to determine the relationship between the work environment and the performance of nurses.Research methodology: A descriptive analytical study was designed for the impact of the work environment on the performance of nurses' jobs in the hospitals of the city of Nasiriyah. The study began in the period from May 15, 2022 to 1 November, 2022. The non-probability (purposive) sample consisted of (410) nurses working in the city center hospitals. Nasiriyah, they were chosen based on the study criteria, and after obtaining approval from them. The data was collected using the questionnaire, which consi
... Show MoreCopper oxide (CuO) nanoparticles were synthesized through the thermal decomposition of a copper(II) Schiff-base complex. The complex was formed by reacting cupric acetate with a Schiff base in a 2:1 metal-to-ligand ratio. The Schiff base itself was synthesized via the condensation of benzidine and 2-hydroxybenzaldehyde in the presence of glacial acetic acid. This newly synthesized symmetric Schiff base served as the ligand for the Cu(II) metal ion complex. The ligand and its complex were characterized using several spectroscopic methods, including FTIR, UV-vis, 1H-NMR, 13C-NMR, CHNS, and AAS, along with TGA, molar conductivity and magnetic susceptibility measurements. The CuO nanoparticles were produced by thermally decomposing the
... Show More