Preferred Language
Articles
/
axZDcIcBVTCNdQwCjEoz
Determination of Magnitudes and Orientation of the Paleostress of Bekhme Structure in Shaqlawa area, Northerneastern Iraq
...Show More Authors

This study presents determination of the paleostress magnitudes and orientation of Bekhme Structure in Shaqlawa area northeastern Iraq. Paleostress Analysis of slip-fault measurements is performed using Right dihedral, Lisle diagram and Mohr Circles methods. Depending on Mohr Circles, Bott law and vertical thickness, the magnitudes of the paleostress at the time of the tectonic activity were determined. Firstly, Georient Software was used to estimate the orientation of the paleostresses (σ1, σ2 and σ3). Secondly, using the rupture –friction law, taking into account depth of the overburden and the vertical stress (σv) was calculated to determine the magnitude of the paleostresses (σ1=4500 bars, σ2=1900 bars and σ3=700 bars). The high magnitudes of the principal stress axes may be referred to the active tectonic events which led to the deformation of the area during Cretaceous and Tertiary periods. The study area shows that the poles of the measured faults lie in the reactivated area of Mohr circles. This indicates the unstability of the study area. The study area is important, due to possibility of exiting of the hydrocarbon is deposited. Fold- Thrust belt mark the deformation fronts of the major orogeny that form from the collision of Arabian Plate with Turkish and Iranian Plates.

Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Land Magnetic survey along a profile from Akaz to Rutba town and its applications
...Show More Authors

A land magnetic survey was carried out along regional profile, which is located at the north part of the Iraqi western desert. It starts from al –Qaam City (at north) toward Rutba City (at south) with a total length of 238km. The survey was carried out along the paved road between the two cities, About 113 measuring points were done with inter-station distance of 2 km (for 198 km) and 2 to 5km (for 40km). Two proton magnetometers were used in this survey. One of them is used for base station monitoring, which was fixed as of Salah Aldin field (Akkas). Its readings were used for diurnal corrections. All magnetic measurements were corrected for normal and topographic corrections. The readings were reduced to a certain base level. The resu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Babylonian theater (Its history, models and properties) a historical comparative study: محمد صبري صالح
...Show More Authors

The building of the Babylonian theater is considered as one of the distinctive buildings where its foundations have remained steadfast in the face of geographical changes, social's erosion and groundwater that threatened almost all traces of Babylon despite the destruction of the outer structure of the building. The general directorate of antiques performed prospection for those foundations (the ground map), and then the building was completed by new bricks over the original scheme. It became clear when examining the building; its components and foundations, that the building is unique in comparison with the old buildings of the world throughout Iraq. There are similar buildings in other places like Jordan and North Africa such as

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Sep 21 2024
Journal Name
Asian Pacific Journal Of Cancer Prevention
Oncolytic Newcastle Disease Virus and Photodynamic Therapy as Dual Approach for Breast Cancer Treatment
...Show More Authors

Objective: We hypothesized that attacking cancer cells by combining various modes of action can hinder them from taking the chance to evolve resistance to treatment. Incorporation of photodynamic therapy (PDT) with oncolytic virotherapy might be a promising dual approach to cancer treatment. Methods: NDV AMHA1 strain as virotherapy in integration with aminolaevulinic acid (ALA) using low power He-Ne laser as PDT in the existing work was examined against breast cancer cells derived from Iraqi cancer patients named (AMJ13). This combination was evaluated using Chou–Talalay analysis. Results: The results showed an increased killing rate when using both 0.01 and 0.1 Multiplicity of infection (MOI) of the virus when combined with a dose of 617

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Mar 16 2022
Journal Name
International Journal Of Recent Contributions From Engineering, Science & It
Smart Learning based on Moodle E-learning Platform and Digital Skills for University Students
...Show More Authors

Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Clarifying Optimum Setting Temperatures and Airflow Positions for Personal Air Conditioning System on Flight
...Show More Authors

In recent years, the demand for air travel has increased and many people have traveled by plane. Most passengers, however, feel stressed due to the limited cabin space. In order to make these passengers more comfortable, a personal air-conditioning system for the entire chair is needed. This is because the human body experiences discomfort from localized heating or cooling, and thus, it is necessary to provide appropriate airflow to each part of the body. In this paper, a personal air-conditioning system, which consists of six vertically installed air-conditioning vents, will be proposed. To clarify the setting temperature of each vent, the airflow around the passenger and the operative temperature of each part of the body is investigate

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Network Self-Fault Management Based on Multi-Intelligent Agents and Windows Management Instrumentation (WMI)
...Show More Authors

This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Developing Arabic License Plate Recognition System Using Artificial Neural Network and Canny Edge Detection
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection

... Show More