Preferred Language
Articles
/
2xYLGYcBVTCNdQwCFTaH
ESTIMATION OF SHEAR WAVE VELOCITY FROM WIRELINE LOGS DATA FOR AMARA OILFIELD, MISHRIF FORMATION, SOUTHERN IRAQ
...Show More Authors

Shear wave velocity is an important feature in the seismic exploration that could be utilized in reservoir development strategy and characterization. Its vital applications in petrophysics, seismic, and geomechanics to predict rock elastic and inelastic properties are essential elements of good stability and fracturing orientation, identification of matrix mineral and gas-bearing formations. However, the shear wave velocity that is usually obtained from core analysis which is an expensive and time-consuming process and dipole sonic imager tool is not commonly available in all wells. In this study, a statistical method is presented to predict shear wave velocity from wireline log data. The model concentrated to predict shear wave velocity from petrophysical parameters and any pair of compressional wave velocity, porosity and density in carbonate rocks. The established method can estimate shear wave velocity in carbonate rocks with a correlation coefficient of close to unity.

Crossref
View Publication
Publication Date
Fri May 16 2025
Journal Name
Tikrit Journal Of Engineering Sciences
Comparative Study of Activated Carbon and Silver Nanoparticle-Loaded Activated Carbon Derived from Tea Waste for Removal of Tetracycline from Aqueous Solution
...Show More Authors

The present work elucidates the utilization of activated carbon (AC) and activated carbon loaded with silver nanoparticles (AgNPs-AC) to remove tetracycline (TC) from synthetically polluted water. The activated carbon was prepared from tea residue and loaded with silver nanoparticles. Scanning electron microscopy (SEM), X-ray diffraction (XRD), Fourier transform infrared spectroscopy (FTIR), and Brunauer-Emmett-Teller (BET) were used to characterize the activated carbon (AC) and silver nanoparticles-loaded activated carbon (AgNPs-AC). The impact of various parameters on the adsorption effectiveness of TC was examined. These variables were the initial adsorbate concentration (Co), solution acidity (pH), adsorption time (t), and dosag

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
Comparison between Different Data Image Compression Techniques Applied on SAR Images
...Show More Authors

In this paper, image compression technique is presented based on the Zonal transform method. The DCT, Walsh, and Hadamard transform techniques are also implements. These different transforms are applied on SAR images using Different block size. The effects of implementing these different transforms are investigated. The main shortcoming associated with this radar imagery system is the presence of the speckle noise, which affected the compression results.

View Publication Preview PDF
Publication Date
Sat Nov 02 2013
Journal Name
International Journal Of Computer Applications
Mixed Transforms Generated by Tensor Product and Applied in Data Processing
...Show More Authors

Finding orthogonal matrices in different sizes is very complex and important because it can be used in different applications like image processing and communications (eg CDMA and OFDM). In this paper we introduce a new method to find orthogonal matrices by using tensor products between two or more orthogonal matrices of real and imaginary numbers with applying it in images and communication signals processing. The output matrices will be orthogonal matrices too and the processing by our new method is very easy compared to other classical methods those use basic proofs. The results are normal and acceptable in communication signals and images but it needs more research works.

View Publication
Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Asian Journal Of Applied Sciences
Comparison between Expert Systems, Machine Learning, and Big Data: An Overview
...Show More Authors

Today, the science of artificial intelligence has become one of the most important sciences in creating intelligent computer programs that simulate the human mind. The goal of artificial intelligence in the medical field is to assist doctors and health care workers in diagnosing diseases and clinical treatment, reducing the rate of medical error, and saving lives of citizens. The main and widely used technologies are expert systems, machine learning and big data. In the article, a brief overview of the three mentioned techniques will be provided to make it easier for readers to understand these techniques and their importance.

View Publication
Crossref (2)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
A multivariate Bayesian model using Gibbs sampler with real data application
...Show More Authors

In many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
The Egyptian Journal Of Hospital Medicine
Evaluation of Interleukin-18 Serum Concentration and Gene Polymorphism (Rs1946518) in A Sample of Type-2 Diabetes Mellitus Patients from Iraq.
...Show More Authors

Background Type two diabetes (T2DM) is characterized by insufficient insulin production and secretion. Additionally, the body develops insulin resistance which affects 90–95% of diabetics. Complex cytokines, receptors, genetic pathways, and the immune system are involved in T2DM. Interleukin-18 (IL-18) is one of the inflammatory cytokines associated with Type 2 diabetes. Environmental and genetic variables, including genetic polymorphisms, can increase T2DM risk and its consequences. Single nucleotide gene polymorphisms (SNPs) are important risk factors for diabetes that can be used to find the disease early and treat it better. Objective This study aimed to determine the levels of IL-18 in the serum of Iraqi patients with Type 2 diabetes

... Show More
Publication Date
Thu Oct 01 2020
Journal Name
Plant Archives
Tracking the existence of PAH in water resources around and away from Al-Ahdab Oil Field in Wasit Governorate of Iraq
...Show More Authors

Some major pollutants of polycyclic aromatic hydrocarbons (PAH) those discharged as water produced (WP) from the AlAhdab oil field (AOF) in the ponds close to it may leak to the water resources around and eventually reaches the marshes which will affect its ecosystem. Thus, this work aims to track the availability of PAH in the water resources and the Main Outfall Drain (MOD) nearby. The determination of PAH was evaluated using “High-Performance Liquid Chromatography (HPLC)”. The mean concentration of sixteen PAH in the produced water within the field was relatively high (0.01 to 10.89 g/ml) with standard deviations of (0.10.9). While, PAH outside the field were gradually diminishes down to (0.01-0.039) x10-2 g/ml which exceeds th

... Show More
Preview PDF
Publication Date
Mon May 29 2023
Journal Name
Russian Law Journal
LEGAL RULES GOVERNING THE DURATION OF THE CONTRACT IN ITS PERIOD OF FORMATION (COMPARATIVE LEGAL STUDY)
...Show More Authors

The duration of the contract is a legal term first provided for in French Amendment Decree No. 131/2016, and given the increasing importance of time in contracts, we have chosen to study the legal rules governing time at the formative stage by drawing on changes in French law compared to both Iraqi and Egyptian laws. Article 1102 of French Amendment Decree No. 131/2016 stipulates that: "Everyone is free to contract or not to contract, to choose the person with whom he contracts, and to determine the content and form of the contract within the limits established by law." Contractual freedom does not permit a breach of the rules relating to public order), as well as article 1104, which provides for (contracts must be nego

... Show More
View Publication Preview PDF
Crossref