Preferred Language
Articles
/
PBb3CooBVTCNdQwCypC7
Building of a Static Model for Jeribe Formation in Jambour Oil Field
...Show More Authors

The Jeribe Formation, the Jambour oil field, is the major carbonate reservoir from the tertiary reservoirs of the Jambour field in northern Iraq, including faults. Engineers have difficulty organizing carbonate reserves since they are commonly tight and heterogeneous. This research presents a geological model of the Jeribe reservoir based on its facies and reservoir characterization data (Permeability, Porosity, Water Saturation, and Net to Gross). This research studied four wells. The geological model was constructed with the Petrel 2020.3 software. The structural maps were developed using a structural contour map of the top of the Jeribe Formation. A pillar grid model with horizons and layering was designed for each zone. Following the porosity model, the average porosity was roughly 11%. According to the permeability model, the reservoir has average permeability of 150 md while average net to gross, water saturation and thickness were 54%, 61%, and 75.5m, respectively. Depending on the average values of each unit separately zones two and three had good petrophysical characteristics, with about 85% of the Jeribe reservoir containing hydrocarbons.

Scopus Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (129)
Crossref (107)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Robust M Estimate With Cubic Smoothing Splines For Time-Varying Coefficient Model For Balance Longitudinal Data
...Show More Authors

In this research، a comparison has been made between the robust estimators of (M) for the Cubic Smoothing Splines technique، to avoid the problem of abnormality in data or contamination of error، and the traditional estimation method of Cubic Smoothing Splines technique by using two criteria of differentiation which are (MADE، WASE) for different sample sizes and disparity levels to estimate the chronologically different coefficients functions for the balanced longitudinal data which are characterized by observations obtained through (n) from the independent subjects، each one of them is measured repeatedly by group of  specific time points (m)،since the frequent measurements within the subjects are almost connected an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Science And Research
Precise Solutions of a Viscoelastic Fluid Flow in an Annular Pipe under an Impulsive Pressure with the Fractional Generalized Burgers' Model
...Show More Authors

This paper deals with an analytical study of the flow of an incompressible generalized Burgers’ fluid (GBF) in an annular pipe. We discussed in this problem the flow induced by an impulsive pressure gradient and compare the results with flow due to a constant pressure gradient. Analytic solutions for velocity is earned by using discrete Laplace transform (DLT) of the sequential fractional derivatives (FD) and finite Hankel transform (FHT). The influences of different parameters are analyzed on a velocity distribution characteristics and a comparison between two cases is also presented, and discussed in details. Eventually, the figures are plotted to exhibit these effects.

View Publication
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
Financial Variables and Their Effects on The Development of Bank Credit and Productive Sectors in Iraq Using a Path Analysis Model
...Show More Authors

This study aims to measure and analyze the direct and indirect effects of the financial variables, namely (public spending, public revenues, internal debt, and external debt), on the non-oil productive sectors with and without bank credit as an intermediate variable, using quarterly data for the period (2004Q1–2021Q4), converted using Eviews 12. To measure the objective of the study, the path analysis method was used using IBM SPSS-AMOS. The study concluded that the direct and indirect effects of financial variables have a weak role in directing bank credit towards the productive sectors in Iraq, which amounted to (0.18), as a result of market risks or unstable expectations in the economy. In addition to the weak credit ratings of borr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 05 2026
Journal Name
Al–bahith Al–a'alami
Objectivity of the Liaison in the Iraqi Media Institutions (Al Mada, Azzaman, Al-Sumaria, Aletejah Instituations & Satalite Channels as a Model)
...Show More Authors

Objectivity is the common denominator between the qualities and elements of a news story that is described as the mother of journalistic arts. When there is doubt about the authenticity of the information contained in the press, whether readable, audible or visual, it means that there is an imbalance in objectivity. When, furthermore, there is an incorrect and intentional use of words in order to influence readers, it means to move away from objectivity as a necessary element in the success of the media institution; and the success of its editorial material.

But the objective interpretation may take several dimensions to the liaison. For the purpose of grasping the interpretation of objectivity among those liaisons working in the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
The concept of freedom in the texts of Yashar Kamal play "The play (The Plate) as a model": عامر صباح نوري المرزوك
...Show More Authors

This research is concerned with studying (the concept of freedom in the texts of Yaşar Kamal the play), as the Turkish playwright (Kamal Yasar) is one of the contemporary playwrights who have been interested in and criticize society, and perhaps the concept of freedom in his texts took a different form, through his ability to renew and present his attempts to create A theatrical form different from his earlier writers in dealing with the life of the peasants and the oppression that went through them, as the researcher identified the problem of his research with the following question: What is the concept of freedom in the texts of Yashar Kamal? The research aims to define the concept of freedom in the texts of Yashar Kamal of the play,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Automatic Determination of Liquid's Interface in Crude Oil Tank using Capacitive Sensing Techniques
...Show More Authors

The petroleum sector has a significant influence on the development of multiphase detection sensor techniques; to separate the crude oil from water, the crude oil tank is used. In this paper, a measuring system using a simple and low cost two parallel plate capacitance sensor is designed and implemented based on a Micro controlled embedded system plus PC to automatically identify the (gas/oil) and (oil/water) dynamic multi-interface in the crude oil tank. The Permittivity differences of two-phase liquids are used to determine the interface of them by measuring the relative changes of the sensor’s capacitance when passes through the liquid’s interface. The experiment results to determine the liquid’s interface is sa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
In Vitro Antimicrobial Activity of Essential Oil Derived from Callistemon viminalis Aerial Part
...Show More Authors

Background: Essential oils extracted from plants have been widely used in antimicrobial activity, particularly the Callistemon viminalis, with a high number of essential oils extracted.

Objectives: To identify the chemical composition of essential oil derived from Callistemon viminalis and evaluates its antimicrobial activity against selected bacterial and fungal strains.

Subjects and methods: During the study, the antimicrobial activity of different selected essential oils on some bacteria (Escherichia coli, Pseudomonas aeruginosa, Salmonella enteritidis, Staphylococcus aureus, and Streptococcus pneumonia) and fungus (Candida albicans) was evalua

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref