Preferred Language
Articles
/
hxcJ0Y0BVTCNdQwC9x2u
Reservoir Network With Structural Plasticity for Human Activity Recognition

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi Geological Journal
Scopus (4)
Scopus
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Geological Journal
Geological Model for Mauddud Reservoir Khabaz Oil Field

The Mauddud reservoir, Khabaz oil field which is considered one of the main carbonate reservoirs in the north of Iraq. Recognizing carbonate reservoirs represents challenges to engineers because reservoirs almost tend to be tight and overall heterogeneous. The current study concerns with geological modeling of the reservoir is an oil-bearing with the original gas cap. The geological model is establishing for the reservoir by identifying the facies and evaluating the petrophysical properties of this complex reservoir, and calculate the amount of hydrocarbon. When completed the processing of data by IP interactive petrophysics software, and the permeability of a reservoir was calculated using the concept of hydraulic units then, there

... Show More
Crossref
Publication Date
Wed Aug 01 2012
Journal Name
I-manger's Journal On Information Technology
A MODULE FOR ENHANCING RECOGNITION SYSTEM FOR QR CODE SCANNED IMAGE

A QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.

Publication Date
Mon Aug 07 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Inhibitory Effect of Some Benzoic Acid Derivatives on Human Erythrocyte Catalase Activity

 In order to study the kinetic of human erythrocytes catalase a well –known enzyme uses H2O2 as substrate as well as hydrogen acceptors, in non smokers and smoker individuals. Anthranilic acid and p-Amino Benzoic Acid (PABA) were used to study their effect on the enzyme. The kinetic study confirmed that anthranilic is a non-competitive inhibitor with Km values of 0.95 and 1.0 for non smokers and smokers respectively (PABA) was found to be a competitive  inhibitor with Vmax  values of 8.0 and 8.9 for nonsmoker and smoker respectively  

View Publication Preview PDF
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security of Iris Recognition and Voice Recognition Techniques

  Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 30 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of penetration Rate and cost with Artificial Neural Network for Alhafaya Oil Field

Prediction of penetration rate (ROP) is important process in optimization of drilling due to its crucial role in lowering drilling operation costs. This process has complex nature due to too many interrelated factors that affected the rate of penetration, which make difficult predicting process. This paper shows a new technique of rate of penetration prediction by using artificial neural network technique. A three layers model composed of two hidden layers and output layer has built by using drilling parameters data extracted from mud logging and wire line log for Alhalfaya oil field. These drilling parameters includes mechanical (WOB, RPM), hydraulic (HIS), and travel transit time (DT). Five data set represented five formations gathered

... Show More
Crossref (4)
Crossref
View Publication Preview PDF
Publication Date
Mon Apr 03 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Integrated Grasshopper Optimization Algorithm with Artificial Neural Network for Trusted Nodes Classification Problem

Wireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica

... Show More
Scopus Clarivate Crossref
View Publication
Publication Date
Sat May 01 2021
Journal Name
Materials Today: Proceedings
Crossref (1)
Crossref
View Publication
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Boosting the Network Performance using Two Security Measure Scenarios for Service Provider Network

Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed

Scopus (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Improving the Network Lifetime in Wireless Sensor Network for Internet of Thing Applications

Mobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern

... Show More
Crossref (5)
Crossref
View Publication Preview PDF