Preferred Language
Articles
/
ijcpe-260
Correlation of Penetration Rate with Drilling Parameters For an Iraqi Field Using Mud Logging Data
...Show More Authors

This paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Electronics,computer Networking And Applied Mathematics
Comparison of Some Estimator Methods of Regression Mixed Model for the Multilinearity Problem and High – Dimensional Data
...Show More Authors

In order to obtain a mixed model with high significance and accurate alertness, it is necessary to search for the method that performs the task of selecting the most important variables to be included in the model, especially when the data under study suffers from the problem of multicollinearity as well as the problem of high dimensions. The research aims to compare some methods of choosing the explanatory variables and the estimation of the parameters of the regression model, which are Bayesian Ridge Regression (unbiased) and the adaptive Lasso regression model, using simulation. MSE was used to compare the methods.

View Publication
Crossref
Publication Date
Wed Aug 01 2012
Journal Name
International Journal Of Geographical Information Science
Assessing similarity matching for possible integration of feature classifications of geospatial data from official and informal sources
...Show More Authors

View Publication
Scopus (63)
Crossref (51)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Indian Journal Of Natural Sciences
Geology and Structure Analysis of Shaqlawa – Merawa Area, Northern Iraq Using Remote Sensing, GIS and Field Observations
...Show More Authors

This study appears GIS techniqueand remote sensing data are matching with the field observation to identify the structural features such as fault segments in the urban area such as the Merawa and Shaqlawa Cities. The use of different types of data such as fault systems, drainage patterns (previously mapped), lineament, and lithological contacts with spatial resolution of 30m was combined through a process of integration and index overlay modeling technique for producing the susceptibility map of fault segments in the study area. GIS spatial overlay technique was used to determine the spatial relationships of all the criteria (factors) and subcriteria (classes) within layers (maps) to classify and map the potential ar

... Show More
View Publication
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 12 2021
Journal Name
Applied System Innovation
The Role of Correlation in the Performance of Massive MIMO Systems
...Show More Authors

Massive multiple-input multiple-output (m-MIMO) is considered as an essential technique to meet the high data rate requirements of future sixth generation (6G) wireless communications networks. The vast majority of m-MIMO research has assumed that the channels are uncorrelated. However, this assumption seems highly idealistic. Therefore, this study investigates the m-MIMO performance when the channels are correlated and the base station employs different antenna array topologies, namely the uniform linear array (ULA) and uniform rectangular array (URA). In addition, this study develops analyses of the mean square error (MSE) and the regularized zero-forcing (RZF) precoder under imperfect channel state information (CSI) and a realist

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Ridge regression method with some classical methods to estimate the parameters of Lomax distribution by simulation
...Show More Authors

Abstract

In this research provide theoretical aspects of one of the most important statistical distributions which it is Lomax, which has many applications in several areas, set of estimation methods was used(MLE,LSE,GWPM) and compare with (RRE) estimation method ,in order to find out best estimation method set of simulation experiment (36) with many replications  in order  to get mean square error and used it to make compare , simulation experiment  contrast with (estimation method, sample size ,value of location and shape parameter) results show that estimation method effected by simulation experiment factors and ability of using other estimation methods such as(Shrinkage, jackknif

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Construction of Nomograms Describing the Effect of Different Variables on the Behavior of a KCl/Polymer Drilling Fluid
...Show More Authors

View Publication Preview PDF