Preferred Language
Articles
/
jnhm-367
ANALYSIS OF MICROFACIES AND DEPOSITIONAL ENVIRONMENT OF LIMESTONE IN YOSONEGORO AREA, GORONTALO PROVINCE, INDONESIA
...Show More Authors

    The research location is the northern part of the Basin of Limboto Lake; the focus of the research is the limestone outcrop with 24 meter thickness in Yosonegoro area. The purpose of the study is to find out facies, standard microfacies and depositional environment on Limboto limestone. The research method carried out consisted of three methods namely the measured section, petrographic analysis and biostratigraphy analysis.

 

The limestone facies in the Yosonegoro area consist of two facies. Then, based on sedimentary structure, composition, color, precipitation texture, terrestrial origin components and the organism content, the two facies can divided into three different microfacies. Paleobathymetry shows a deepening from the middle shelf - upper slope to the upper slope - lower slope due to the sea level rise. Compilation of standard microfacies and paleobathymetry types shows changes in depositional environment from the slope environment to the toe of slope environment. The result of this study will be led researchers to propose the name of the new formation, which is the Limboto Limestone Formation according to specific location and characteristics from the previous formation name of the Clastic Limestone Formation.  

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 12 2010
Journal Name
Journal Of Planner And Development
The effect of pedestrian roads in providing a comfortable environment for humans
...Show More Authors

Planning of cities show great attention on streets planning as one of the most structural component foundations for cities, that providing many functional needs and connect parts of the city each other, and work as a commercial and services activities centers. Instead of this highly focused on distributing streets with different streets types such as economical and trading and housing streets. This concerned was only on the dimensions and scales of different types of vehicles and their movement. When scale and dimension and movement of mans were as a second priority in designing and planning streets. Which came's first for traditional streets. The research try to submit some designs guides for planners that contribute in re conce

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2025
Journal Name
Journal Of Kufa For Chemical Sciences
A review on Chromatographic Techniques for the Determination of Pharmaceuticals in Environment
...Show More Authors

The past several years have seen an increase in awareness of the pervasiveness of medications as pollutants in the aquatic environment. The main reason for concern regarding the release of pharmaceuticals into the environment is the possibility that biological agents may become opposing to them. The development of precise and reliable analytical techniques for pharmaceutical determination in a range of samples is necessary for their safe use in the pharmaceutical industry and medical treatments. This review offers a summary of chromatographic techniques for identifying and quantifying the examination of pharmaceuticals in a range of environmental samples. Both the general public and the scientific community are currently very intere

... Show More
View Publication
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-anbar Journal Of Veterinary Sciences
Essential of Hygienic Practices on Bacterial Contamination in some Restaurants of Al- Karkh Area, Baghdad, Iraq
...Show More Authors

This study aimed to evaluate good manufacturing practices in food safety of ten different restaurants in the Al-Karkh area of Baghdad, Iraq. Forty samples collected from were collected from knives, food cutting boards, tables, hands and nails workers in restaurants. In addition. 70 food handlers were selected. Through structured interviews, information on the checklist for Good Manufacturing Practices in Food Safety, Food handlers’ general checklist for good hygiene, and Personal Hygiene Checklist were collected. The overall viable bacterial count before Good Hygiene Practices was significantly higher (P<0.05) than the total bacterial counts after Good Hygiene Practices. The highest viable bacterial counts before Good Hygiene P

... Show More
View Publication
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Impact of Cultural Dimensions of Multicultural Project Teams - Fielder search in the Diyala bridge area project
...Show More Authors

This search that addressed with (( The Impact of Cultural Dimensions in multicultural Project Teams )) tagged is important variables in the project environment that rare has been adverted in Arabic studies .  The search problem is reflected in missing of awareness towards a cultural dimensions of the Diyala bridge area project team and their impact in project communications ، as well as weak project management interest in adopting a clear and scientific approach in the management and organization of project communications in order to reach the objective of the study ، was used questionnaire that built depending on previous global studies and has been adapted to accommodate Iraqi business e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Acta Microbiologica Bulgarica
Human Papillomavirus Genotyping among Women and its Relationship with Cervical Cancer in Diyala Province
...Show More Authors

The study aimed to identify Human Papillomavirus (HPV) and its genotypes prevalent among Iraqi women. They collected 89 cervical swab samples from diagnosed patients at Baghdad Teaching Hospital's Early Detection Clinic. Using PCR technique on 19 samples, they found HPV16 (57.89%) and HPV6 (10.52%) genotypes, while HPV-11, 18, and 45 were absent. HPV 16 and HPV 6 were common in cervical cancer among Iraqi women. Sequencing revealed nucleic acid variants in HPV-6 (124A>C) and HPV-16 (225G>T) E6 genes, resulting in silent effects on the encoded protein. These changes didn't alter amino acid residues (p.74I= and p.L117=). Phylogenetic analysis showed substantial distances between their samples and other viral types, indicating di

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Algal study in springs and streams from Shaqlawa district, Erbil Province, Iraq I- Euglenophyta
...Show More Authors

In an intensive study of the various species of the Euglenophyceae under different environmental conditions, the algal samples were collected monthly in twelve springs and six related streams from September 2019 to August 2020 within Shaglawa district-Erbil Province in virgin areas for phycolimnological study. Twenty species of Euglenophyceaen are identified as a new record for the algal flora. These taxa consist of Colacium vesiculosum, Lepocinclis salina and L.wangi, Eutreptia viridis, Euglena chlamydophora, E. clavata,

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jun 02 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Identification of microflora associated with dust falling on Karbala province and seasonal distribution
...Show More Authors

Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Iraqi Journal Of Science
The Engineering Properties and Geochemical Relationship For The Volcaniclastic Rocks Of The Muqdadiya Formation In Hemrin Area, NE. IRAQ
...Show More Authors

Volcaniclastic rocks of Al Muqdadiya Formation (Pliocene) in Injana area, southern Hemrin anticline, NE of Iraq, were studied ( petrographically, physically, mineralogically and geochemically , as well as the engineering properties) to assess the suitability of volcaniclastic rocks to use them in industry as refractories. The results show that the physical and engineering properties change with the temperature change. The bulk density and the specific gravity increase by increasing temperature while the apparent porosity, water sorption and the linear shrinkage decrease. On the other hand the compressive strength increase by increasing temperature. The volcaniclastics have very low thermal conductivi

... Show More
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref