Preferred Language
Articles
/
LBdzSY8BVTCNdQwC62ly
Integrated Core and Log Data to Determine the Reservoir Flow Unit and Rock Facies for Mishrif Formation in South Eastern Iraq
...Show More Authors

This work represents study the rock facies and flow unit classification for the Mishrif carbonate reservoir in Buzurgan oil Field, which located n the south eastern Iraq, using wire line logs, core samples and petrophysical data (log porosity and core permeability). Hydraulic flow units were identified using flow zone indicator approach and assessed within each rock type to reach better understanding of the controlling role of pore types and geometry in reservoir quality variations. Additionally, distribution of sedimentary facies and Rock Fabric Number along with porosity and permeability was analyzed in three wells (BU-1, BU-2, and BU-3). The interactive Petrophysics - IP software is used to assess the rock fabric number, flow zones, and reservoir quality index. The Mishrif Formation has four distinct rock types and groups that have been recognized using the approach. The first rock type represents a poor reservoir quality (mud-dominated fabrics) with rock-fabric numbers equals to 2.5-4, the second rock type reveals a moderate reservoir quality (wackestone-Packstone Microfacies), the third rock type depicts a good reservoir quality (grain-dominated packstone) with rock-fabric numbers equals to 1.5-2.5 and 0.5-1.5.

Scopus Crossref
View Publication
Publication Date
Wed Aug 25 2021
Journal Name
2021 7th International Conference On Contemporary Information Technology And Mathematics (iccitm)
Anomaly Detection in Flight Data Using the Naïve Bayes Classifier
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Robust Two-Step Estimation and Approximation Local Polynomial Kernel For Time-Varying Coefficient Model With Balance Longitudinal Data
...Show More Authors

      In this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of  specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of weighted estimated method and proposed method (BEMW) for estimation of semi-parametric model under incomplete data
...Show More Authors

Generally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
On the Use of the First-Person Pronoun ‘we’ in Final-Year Master Projects of South Algerian EFL Students
...Show More Authors

Literature on the use of the first-person pronoun in abstracts and conclusion sections of final-year projects is limited. In case of Algerian Master students, it is too scant. The present paper aims at filling this gap through a study concerned with students’ and engagement in their final projects (memoirs). This quantitative study examines the use of “we” and its various types, “our- us-I, my, the researcher” in memoirs chosen at random from the d-space portal of the University of Adrar, southern Algeria. Sixty-five papers, submitted in the fields of Linguistics or didactics between 2015 and 2020 and representing nearly half of the whole memoirs’ depository at the library’s d-space, constituted the corpus of study. The des

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Use of Gis for Creating a Project Management Data Base in Baghdad Al-Rissfa
...Show More Authors

The main objective of resources management is to supply and support the site operation with necessary resources in a way to achieve the required timing in handing over the work as well as to achieve the cost-realism within the budget estimated. The research aims to know the advantage of using GIS in management of resources as one of the new tools that keep pace with the evolution in various countries around the world also collect the vast amount of spatial data resources in one environment easily to handled and accessed quickly and this help to make the right decision regarding management of resources in various construction projects. The process of using GIS in the management and identification of resources is of extreme importance in t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 20 2024
Journal Name
International Journal Of Disabilities Sports And Health Sciences
Analytical Thinking and its Relationship to the Performance of the Simple Response Skill in Foil Weapon for Students
...Show More Authors

The purpose of this paper is to identifying the level of analytical thinking and its relationship to the skills of response and simple response to the foil weapon for students of the College of Physical Education and Sports Sciences, University of Basra. Achieving the objectives of the research requires the use of a research method, and accordingly, the researchers used the descriptive method using the survey method .The two researchers identified the research community with the students of the third stage - College of Physical Education and Sports Sciences / University of Basra / for the academic year (2021-2022). Their number is (45) students and the two researchers chose the entire research community to represent th

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
College Of Islamic Sciences
Features of visual formation in the poetry of the poets of the Umayyad era
...Show More Authors

Abstract

The Umayyad poets tried to invest all artistic tools in order to achieve a measure of creativity in their texts. The phenomenon of visual composition is breaking the familiar writing system, with the aim of increasing the number of possible connotations. The visual in the Umayyad poetry tries to replace it through expression with the visual image, and its manifestations were manifested by the multiplication of punctuation marks in the body of the poetic text and the tearing of the single poetic line by cutting it into several sentences or repetition.

Keywords: visual formation, poetic writing, Umayyad poetry, recipien

View Publication Preview PDF
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Taxonomical and Comparative morphological study for two wild species of the genus Chaenorhinum (D.C.) Reichb. (Scrophulariaceae) in Iraq.
...Show More Authors

Comparative morphological study has been treated for two species of the genus Chaenorhinum (D.C.) Richb., These species were: 1. Chaenorhinum calycinum 2. Chaenorhinum rubrifolium (Robill. & cast. Ex Lam. & DC.) Fourr. The genus belong to the family Scorphulariaceae. Morphological characters has been studies for: root, stem, leaves, flowers (calyx, corolla, androcium including filaments and anthers, gynocium including ovary, style and stigma), fruits and seeds also has been characterized. Key for there two species presented using some quantitative characters. Other characters like shape of fruits and seeds were used too, and they were of a useful taxonomic value

View Publication Preview PDF
Crossref