The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
In light of accelerating environmental degradation, the transition to a green economy is an imperative for achieving sustainable development. This study provides a critical analysis of the international legal and institutional framework governing this transition, revealing a significant gap between normative developments and the institutional framework on one hand, and their practical implementation on the other. The transition faces legal obstacles, including reliance on non-binding voluntary commitments and conflicts between environmental obligations and global trade and investment rules. It also reveals a significant financing gap, as financial flows to developing countries continue to lag behind commitments, in add
... Show MoreCompanies need to educate people about the facts that characterize the business. This is the mission of promotion, it is an important marketing activity, promotion communicates with others and seeks to provide customers with a new business process experience.
Advertising is the most important methods of promotion and the best way to reach an audience. Once the organization advertises its products and services, it can operate in a competitive environment. Marketing competition requires knowledge of humanity that must be affected and convinced. Advertising should create Desires and need for satisfaction. This research comes in the study of visual representations of this psychological incident and how to use it communicatively to create
Background: Painful elbow joint over the lateral epicondyle especially with resisted wrist extension are common signs of lateral epicondyle tendinopathy, also called tennis elbow. Objective: To evaluate the clinical outcome of local platelet rich plasma (PRP) injection in patients with chronic tennis elbow compared with a steroid (Depomedrol 40 mg) injection. Methods: A total of 88 patients with chronic tennis elbow were treated at Al-Kindy Teaching Hospital and private clinics. All patients had chronic pain for about 24 weeks or more and had failed first line treatment. The patients dividing into two groups, Group A injected with PRP (n = 44), and group B injected with depomedrol 40 mg (n = 44). A good clinical result w
... Show MoreBackground: Painful elbow joint over the lateral epicondyle especially with resisted wrist extension are common signs of lateral epicondyle tendinopathy, also called tennis elbow.
Objective: To evaluate the clinical outcome of local platelet rich plasma (PRP) injection in patients with chronic tennis elbow compared with a steroid (Depomedrol 40 mg) injection.
Methods: A total of 88 patients with chronic tennis elbow were treated at Al-Kindy Teaching Hospital and private clinics. All patients had chronic pain for about 24 weeks or more and had failed first line treatment. The patients dividing into two groups, Group A injected with PRP (n = 44), and group B injected with d
... Show MoreThe purpose of this study was to investigate the difference in mandibular trauma caused by two mechanisms for the delivery of missile injuries: firearms and improvised explosive devices (IEDs). The data investigated included sex, age, mechanism of injury, and other clinical and radiographic manifestations. Seventy consecutive patients, predominantly male, with a mean age of 28.6 ± 14 years (range 2–60 years) were enrolled: 38 patients (54.3%) sustained mandibular fractures caused by bullet injuries and 32 patients (45.7%) had mandibular fractures caused by IED explosion injuries. The study revealed that the differences in most of the investigated variables were not statistically significant; the only significant differences were the inci
... Show More