Preferred Language
Articles
/
dRYGVocBVTCNdQwCq0aO
SPE-188966-MS: Drilling problems detection in Basrah oil fields using smartphones
...Show More Authors

Scopus
Publication Date
Fri May 01 2020
Journal Name
Iraqi Geological Journal
DETERMINATION OF PORE TYPES AND POROSITY TRENDS USING OF VELOCITY-DEVIATION LOG FOR THE CARBONATE MISHRIF RESERVOIR IN HALFAYA OIL FIELD, SOUTHEAST IRAQ
...Show More Authors

View Publication
Scopus (17)
Crossref (2)
Scopus Crossref
Publication Date
Fri Apr 22 2022
Journal Name
Neuroquantology
Effect of Using Avocado and Chia Oil and their Mixture in Meat Broiler Diets on Some Physiological and Microbial Characteristics of Blood Plasma
...Show More Authors

This study was conducted in the field of the Poultry Research Station of the Department of Animal Production / Department of Agricultural Research / Ministry of Agriculture for the period 4/4/2021 to 16/5/2021, in which 300 one-day-old Ross308 chicks that fed on diets used avocado oil and Chia with percentages 0, 0.2, 0.4, 0.6% respectively, and their mixture consisting of 0.0, 0.1, 0.2, 0.3 each of avocado and Chia oil (50% avocado + 50% Chia oil). The experiment included 4 treatments with 3 replicates for each treatment (10 birds/replicates), in order to study the effect of using avocado and chia oil and their mixture in meat broiler diets on some physiological and microbial characteristics of blood plasma. The results indicate a

... Show More
View Publication
Crossref
Publication Date
Mon May 31 2021
Journal Name
Iraqi Geological Journal
Mechanical Rock Properties Estimation for Carbonate Reservoir Using Laboratory Measurement: A Case Study from Jeribe, Khasib and Mishrif Formations in Fauqi Oil Field
...Show More Authors

Estimation of mechanical and physical rock properties is an essential issue in applications related to reservoir geomechanics. Carbonate rocks have complex depositional environments and digenetic processes which alter the rock mechanical properties to varying degrees even at a small distance. This study has been conducted on seventeen core plug samples that have been taken from different formations of carbonate reservoirs in the Fauqi oil field (Jeribe, Khasib, and Mishrif formations). While the rock mechanical and petrophysical properties have been measured in the laboratory including the unconfined compressive strength, Young's modulus, bulk density, porosity, compressional and shear -waves, well logs have been used to do a compar

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Image Segmentation for Skin Detection
...Show More Authors

Human skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Computer Sciences And Informatics
Edge Detection Methods: A Review
...Show More Authors

This article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss

... Show More
View Publication
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Detection of Methamphetamine using Nanobentonite as a Novel Solid Phase Extraction Column Matrix Assisted with Gas Chromatography- Mass Spectroscopy
...Show More Authors

          This study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Improving the efficiency and security of passport control processes at airports by using the R-CNN object detection model
...Show More Authors

The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Jordanian Journal Of Computers And Information Technology
BEYOND WORDS: HARNESSING SPEECH SOUND FOR SPEAKER AGE AND GENDER DETECTION USING 1D CNN ARCHITECTURE WITH SELF-ATTENTION MECHANISM
...Show More Authors

Beyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (19)
Crossref (12)
Scopus Crossref
Publication Date
Fri Mar 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Construction of Nomograms Describing the Effect of Different Variables on the Behavior of a KCl/Polymer Drilling Fluid
...Show More Authors

View Publication Preview PDF