Preferred Language
Articles
/
jnhm-164
DETECTION OF SUBSURFACE CAVITIES BY THE ELECTROMAGNETIC METHOD (Case Study at Haditha Area)
...Show More Authors

Two EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Wed Feb 06 2019
Journal Name
Journal Of The College Of Education For Women
The Effect use of the Internet in Academic Libraries A Case Study
...Show More Authors

The aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.

View Publication Preview PDF
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Surface-Subface Geochemical and Mineralogical Study of Gypcrete in Alexandria Area Central Iraq
...Show More Authors

Gypsiferous soil deposits (Gypcrete) are weakly consolidate earthy mixture of secondary gypsum, sand and clay. It is formed in arid and semi- arid area with annual precipitation rainfall less than 400mm. These sediments occur in surface and subsurface in region of little rainfall and rapid evaporation. This research deals with the study of gypcrete in Alexandria to improve the mineralogical and geochemical properties of the gypcrete. The gypcrete soil is used as raw material to produce the plaster for building purposes. Three samples of gypcrete were chemically and geochemically analyzed. The common mineral is howed in 0-0.5m Gypsum followed by Calcite in 0-1m and Quartz in 1-1.5m due to leaching and infiltration by rainfall as well as it

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2008
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
THE STUDY OF MINERALOGICAL AND MICROFACIES ANALYSIS SHIRANISH FORMATION WELL (KH-6) ANSAB AREA IN SOUTHERN IRAQ
...Show More Authors

The study of Shiranish Formation rocks in southern part of Iraq at Ansab area well (KH-6)
were carried out. The formation is tongued with tayarat formation, which bounded from top
and bottom, the upper tongue at thickness 49m. and tongued at depth (476-525m.) the lower
tongue at thickness 4m. tongued at (541-537m.).
The rocks of this formation were divided into three sedimentary microfacies:
1- Dolomitized formininferal Wackestone facies.
2- Dolomitized formininferal Mudstone facies.
3- Dolostone facies.
34 slides were investigated depending on mineralogical, compositional and biological
processes and compared diagenesis which reflect open marine shelf at lower part of formation
(F.Z.2) (S.M.F.8), but at the

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Study of some structural , optical , Electrical Properties of CdS thin films deposited by chemical Spray Pyrolysis Method
...Show More Authors

In this research we prepared CdS thin films by Spray pyrolysis method on a glass substrates and we study its structural , optical , electrical properties .The result of (X-Ray ) diffraction showed that all thin films have a polycrystalline structure , The relation of the transmission as a function of wavelength for the CdS films had been studied , The investigated of direct energy gap of the CdS its value is (2.83 eV). In Hall effect measurement of the CdS we find the charge carriers is p – type and Hall coefficient 1157.33(cm3/c) ,Hall mobility 6.77(cm2/v.s)

View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Response of Piles Group embedded in Sandy Soil with Cavities to Seismic Loading
...Show More Authors

Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Balancing the Multi Assembly line Using Ranked Positional Weight and COMSOAL Algorithms: Case Study at the Sewing line Factory (7) /the General Company for Leather Industries (GCLI/ Baghdad)
...Show More Authors

      The problem of multi assembly line balancing appears as one of the most prominent and complex type of problem. The research problem of this dissertation is concerned with choosing the suitable method that includes the nature of the processes of the multi assembly type of the sewing line at factory no. (7). The State Company for Leather Manufacturing. The sewing line currently suffers from idle times at work stations which resulted in low production levels that do not meet the production plans. The authors have devised a flexible simulation model which uses the uniform distribution to generate task time for each shoe type produced by the factory. The simulation of the multi assembly line was based on assigni

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The research is based on a thesis not discussed: Test the strategy of the General Organization based on the model Wichler and Bakov A case study at the Iraqi Ministry of Interior
...Show More Authors

The study aimed at identifying the strategic gaps in the actual reality of the management of public organizations investigated to determine the strategy used based on the study model. The study relied on the variable of the general organization strategy in its dimensions (the general organization strategy, the organization's political strategy and the defense strategy of the organization) The sample of the study was (General Directorate of Traffic, Civil Status Directorate and Civil Defense Directorate), formations affiliated to the Ministry of the Interior, for the importance of the activity carried out by these public organizations by providing them In order to translate the answers into a quantitative expression in the analysi

... Show More
View Publication Preview PDF
Crossref