Preferred Language
Articles
/
SxZ3IIcBVTCNdQwCazkQ
Discrete Fracture Network and Fractured Reservoir Characterization in Khabaz Field-Tertiary Formation
...Show More Authors

Crossref
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Nov 12 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Application of Discrete Logarithms in Information - Hiding and Knapsack Problem with New Properties of Sk-Sets
...Show More Authors

Discrete   logarithms  are applied      in many    cryptographic problems  . For instance ,   in public   key .  and for construction of sets with disti nct sums of  k-clcments.  The   purpose o r  this   paper

is  to  modify  the  method ol' informationl1·iding  using        discrete logarithms  , introduce new properties of St - sets ,   uscdthe direct product   of    groups   to construct  cyclic group and finally, present modified   method   for   knapsack &

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 31 2022
Journal Name
Iraqi Geological Journal
Geological Model of the Khabour Reservoir for Studying the Gas Condensate Blockage Effect on Gas Production, Akkas Gas Field, Western Iraq
...Show More Authors

The Khabour reservoir, Ordovician, Lower Paleozoic, Akkas gas field which is considered one of the main sandstone reservoirs in the west of Iraq. Researchers face difficulties in recognizing sandstone reservoirs since they are virtually always tight and heterogeneous. This paper is associated with the geological modeling of a gas-bearing reservoir that containing condensate appears while production when bottom hole pressure declines below the dew point. By defining the lithology and evaluating the petrophysical parameters of this complicated reservoir, a geological model for the reservoir is being built by using CMG BUILDER software (GEM tool) to create a static model. The petrophysical properties of a reservoir were computed using

... Show More
Scopus (4)
Scopus Crossref
Publication Date
Wed Sep 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modified Radial Based Neural Network for Clustering and Routing Optimal Path in Wireless Network
...Show More Authors

Several methods have been developed for routing problem in MANETs wireless network, because it considered very important problem in this network ,we suggested proposed method based on modified radial basis function networks RBFN and Kmean++ algorithm. The modification in RBFN for routing operation in order to find the optimal path between source and destination in MANETs clusters. Modified Radial Based Neural Network is very simple, adaptable and efficient method to increase the life time of nodes, packet delivery ratio and the throughput of the network will increase and connection become more useful because the optimal path has the best parameters from other paths including the best bitrate and best life link with minimum delays. The re

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Spike neural network as a controller in SDN network
...Show More Authors

The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Aug 17 2017
Journal Name
Journal Of Health, Medicine And Nursing
Adherence to Guidelines of Secondary Prevention in patients with Ischemic Heart Disease in a Tertiary Cardiac Center
...Show More Authors

Coronary heart disease (CHD) is the leading cause of death in United State (U.S.). Controlling of modifiable risk factors such as smoking, hypertension (HT), diabetes mellitus (D.M.), dyslipidemia, physical inactivity & obesity will prevent other serious cardiovascular complications

Publication Date
Sat Jun 18 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Factors Impacting Hypertension Awareness among Hypertensive Population: A Quantitative Study in a Tertiary Care Hospital in Malaysia
...Show More Authors

 There are obstacles to high levels of hypertension awareness that are embedded in gender, income and lifestyle habits which need to be addressed leading to high levels of undiagnosed and uncontrolled hypertension. This study aimed to explore the various factors which affect hypertension awareness among a hypertensive population in a tertiary care hospital.

 A quantitative study was conducted among hypertensive patients at a tertiary care hospital in Selangor, Malaysia. A validated and translated questionnaire was utilised as a data collection tool. Descriptive and inferential statistical analysis was done using SPSS version 25.

A thousand participants (female n=621, male n= 379) were recruited, and their

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
Geological Model of the Tight Reservoir (Sadi Reservoir-Southern of Iraq)
...Show More Authors

A3D geological model was constructed for Al-Sadi reservoir/ Halfaya Oil Field which is discovered in 1976 and located 35 km from Amara city, southern of Iraq towards the Iraqi/ Iranian borders.

Petrel 2014 was used to build the geological model. This model was created depending on the available information about the reservoir under study such as 2D seismic map, top and bottom of wells, geological data & well log analysis (CPI). However, the reservoir was sub-divided into 132x117x80 grid cells in the X, Y&Z directions respectively, in order to well represent the entire Al-Sadi reservoir.

Well log interpretation (CPI) and core data for the existing 6 wells were the basis of the petrophysical model (

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jun 03 2019
Journal Name
Rawal Medical Journal
SUPERIOR VERSUS ANTERIOR PLATING OF MIDSHAFT CLAVICLE FRACTURE IN ADULT COMPARATIVE STUDY
...Show More Authors

Clavicle fractures are common injuries in young, active individuals. The majority of the fractures (80% to 85%) occur in the mid-shaft of the bone and account for approximately 2.6% of all fractures. For many years the standard treatment of fracture clavicle was the "figure-of-eight" bandage but several indications for operative fixation, the position of plate fixation for clavicle fracture remains controversial. The aim of this study is to compare between anterio—inferior and anterior-superior plating of mid-shaft displaced clavicle fracture in complications, plate prominence, nonunion, malunion and range of motion. This study is a prospective study conducted in Al-Kindy teaching hospital .A total of 30 patients with fracture mid –sh

... Show More
View Publication Preview PDF