The most significant function in oil exploration is determining the reservoir facies, which are based mostly on the primary features of rocks. Porosity, water saturation, and shale volume as well as sonic log and Bulk density are the types of input data utilized in Interactive Petrophysics software to compute rock facies. These data are used to create 15 clusters and four groups of rock facies. Furthermore, the accurate matching between core and well-log data is established by the neural network technique. In the current study, to evaluate the applicability of the cluster analysis approach, the result of rock facies from 29 wells derived from cluster analysis were utilized to redistribute the petrophysical properties for six units of Mishrif Formation; MA, MB11, MB12, MB21, MC1, and MC2. The precise facies modelling is constructed by using Petrel software while applying different appropriate scale-up methods. Consequently, the petrophysical properties such as porosity, water saturation and permeability are distributed within each unit depending on facies modelling. The Net to a gross parameter which has a significant impact on determining original oil in place (OIIP) also calculated and distributed using facies modelling. The facies modelling is performed to obtain an accurate estimation of OIIP. Finally, the results of the facies investigation have a significant effect on petrophysical properties and therefore affect the estimation of OIIP by 2\% for the whole Mishrif Formation.
The direct electron transfer behavior of hemoglobin that is immobilized onto screen-printed carbon electrode (SPCE) modified with silver nanoparticles (AgNPs) and chitosan (CS) was studied in this work. Cyclic voltametry and spectrophotometry were used to characterize the hemoglobin (Hb) bioconjunction with AgNPs and CS. Results of the modified electrode showed quasi-reversible redox peaks with a formal potential of (-0.245 V) versus Ag/AgCl in 0.1 M phosphate buffer solution (PBS), pH7, at a scan rate of 0.1 Vs-1. The charge transfer coefficient (α) was 0.48 and the apparent electron transfer rate constant (Ks) was 0.47 s-1. The electrode was used as a hydrogen peroxide biosensor with a linear response over 3 to 240 µM and a detection li
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreAutomated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breat
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe objective of the study was to identify the effectiveness of a training program based on the employment of the educational portal in the development of the skills of the administrative body in the basic education schools in Dhofar Governorate. To achieve the goal, a training program was designed that includes the skills of the educational portal to be met by the administrative body and measuring its effectiveness. A questionnaire to identify training needs, and a notecard to evaluate performance. The study sample consisted of (70) individuals of the administrative staff. The researchers used the descriptive-analytical method to identify the training needs, design and build the training program and the experimental method for applying
... Show MoreThe current research aimed to study the effect of an exercise program on physical-kinetic intelligence and the skills of dribbling and shooting in basketball among female students. The research community was composed of 102 female students in the second stage of the Physical Education and Sports Sciences College for Girls of Baghdad University, in the academic year 2021-2022. A total of 40 female students were the sample of the study: 20 female students in the control group and 20 female students in the experimental group. After the implementation of the exercise program, there were significant improvements from pre-tests to post tests in the two groups (control and experimental groups), in physical-kinetic intelligenc
... Show MoreThis study was aimed to investigate the response of two types of ornamental herbaceous plants (Wedelia trilobata and Jacobaea maritima 'Cirrus') to different agricultural environments and the application of potassium silicates to the living walls system LWS (Felt layer system) under the climate conditions of Baghdad city. Each experiment involved the cultivation of a different plant species, and the study duration was from September 15, 2021, to August 1, 2022. A Strip-Plot Design experiment was conducted using two factors: factor M with four levels of substrates (50% peatmoss and perlite (M1), 50% Vermicompost and perlite (M2), 50% Water hyacinth compost and perlite (M3), 50% wheat straw compost and perlite (M4)) and factor S with
... Show More