This research aims to distinguish the reef environment from the non-reef environment. The Oligocene-Miocene-succussion in western Iraq was selected as a case study, represented by the reefal limestone facies of the Anah Formation (Late Oligocene) deposited in reef-back reef environments, dolomitic limestone of the Euphrates Formation (Early Miocene) deposited in open sea environments, and gypsiferous marly limestone of the Fatha Formation (Middle Miocene) deposited in a lagoonal environment. The content of the rare earth elements (REEs) (La, Ce, Pr, Nd, Sm, Eu, Gd, Tb, Dy, Er, Ho, Tm, Yb, Lu, and Y) in reef facies appear to be much lower than of those in the non-reef facies. The open sea facies have a low content of REEs due to being a transitional phase. The facies investigated have ƩREEs lower than the PAAS. The lagoonal facies shows an average ƩREEs higher than the Global Standard of Carbonate Rocks (GSCR), whereas reefal and open sea facies contain lower. The Y/Ho, Y/Dy, and Er/Nd were used as distinctive indicators of facies diagnosis; reefal facies have a high value of Y/Ho, Y/Dy, and Er/Nd as compared to PAAS are higher than1. In contrast, non-reef facies (lagoonal) have a lower value of Y/Ho, and Y/Dy as compared to PAAS is lower than 1, but Er/Nd is higher than 1. While in open sea facies the Y/Ho and Y/Dy have moderate values as compared to PAAS are close to 1, but a high value of Er/Nd as compared to PAAS higher than 1.
This work implements the face recognition system based on two stages, the first stage is feature extraction stage and the second stage is the classification stage. The feature extraction stage consists of Self-Organizing Maps (SOM) in a hierarchical format in conjunction with Gabor Filters and local image sampling. Different types of SOM’s were used and a comparison between the results from these SOM’s was given.
The next stage is the classification stage, and consists of self-organizing map neural network; the goal of this stage is to find the similar image to the input image. The proposal method algorithm implemented by using C++ packages, this work is successful classifier for a face database consist of 20
... Show MoreFlow-injection (FI) spectrophotometric method has been developed for the analysis of thymol in pharmaceutical preparations. The method is based on organic coupling reaction between thymol and 4-amino antipyrine in the presence of alkaline medium to form an intense stable red color complex with copper nitrate that has a maximum absorption at 490 nm. Optimum conditions for determination of the drug was investigated .The calibration graph was linear over the range of 5-500 µg.ml-1 of thymol . The limit of detection (LOD) and limit of quantification (LOQ) were 1.81 ?g mL-1 and 3.60 ?g mL-1 respectively .The proposed method was applied satisfactorily to the determination of thymol in mouth wash preparations. The procedure is characterized by
... Show MoreFace recognition, emotion recognition represent the important bases for the human machine interaction. To recognize the person’s emotion and face, different algorithms are developed and tested. In this paper, an enhancement face and emotion recognition algorithm is implemented based on deep learning neural networks. Universal database and personal image had been used to test the proposed algorithm. Python language programming had been used to implement the proposed algorithm.
The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv
... Show MoreThe term "tight reservoir" is commonly used to refer to reservoirs with low permeability. Tight oil reservoirs have caused worry owing to its considerable influence upon oil output throughout the petroleum sector. As a result of its low permeability, producing from tight reservoirs presents numerous challenges. Because of their low permeability, producing from tight reservoirs is faced with a variety of difficulties. The research aim is to performing hydraulic fracturing treatment in single vertical well in order to study the possibility of fracking in the Saady reservoir. Iraq's Halfaya oil field's Saady B reservoir is the most important tight reservoir. The diagnostic fracture injection test is determined for HF55using GOHFER soft
... Show MoreWarm asphalt mixture (WMA) and reclaimed asphalt pavement (RAP) are the most memorable sustainable materials in world of asphalt concrete pavements . This research aims to study the warm asphalt mixture for different types of filler materials such as ordinary cement and limestone dust. Beside, this research focused on the test of emulsified asphalt properties by evaluating the performance of warm asphalt mixture by Marshall Stability properties as well as moisture sensitivity. The results of this experiment provided many important points. First, The cationic emulsified asphalt is suitable with RAP aggregate for production warm asphalt mixtures .Second, The effective mixing procedure for warm asphalt mixtures consists hea
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More