This paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.
Iraq is located near the northern tip of the Arabian plate, which is advancing northwards relative to the Eurasian plate, and is predictably, a tectonically active country. Seismic activity in Iraq increased significantly during the last decade. So structural and geotechnical engineers have been giving increasing attention to the design of buildings for earthquake resistance. Dynamic properties play a vital role in the design of structures subjected to seismic load. The main objective of this study is to prepare a data base for the dynamic properties of different soils in seismic active zones in Iraq using the results of cross hole and down hole tests. From the data base collected it has been observed that the average ve
... Show MoreThe cross section evaluation for (α,n) reaction was calculated according to the available International Atomic Energy Agency (IAEA) and other experimental published data . These cross section are the most recent data , while the well known international libraries like ENDF , JENDL , JEFF , etc. We considered an energy range from threshold to 25 M eV in interval (1 MeV). The average weighted cross sections for all available experimental and theoretical(JENDL) data and for all the considered isotopes was calculated . The cross section of the element is then calculated according to the cross sections of the isotopes of that element taking into account their abundance . A mathematical representative equation for each of the element
... Show MoreAbstract: -
The concept of joint integration of important concepts in macroeconomic application, the idea of cointegration is due to the Granger (1981), and he explained it in detail in Granger and Engle in Econometrica (1987). The introduction of the joint analysis of integration in econometrics in the mid-eighties of the last century, is one of the most important developments in the experimental method for modeling, and the advantage is simply the account and use it only needs to familiarize them selves with ordinary least squares.
Cointegration seen relations equilibrium time series in the long run, even if it contained all the sequences on t
... Show MoreA total of 33 Iraq male positive for Toxoplasmosis and Iraq male negative for Toxoplasmosis (controls) were studies to Evaluation of some biochemical and immunological parameters changes.The parameters included lipid profile such as (Cholesterol(C), Triglycerides(TG), High-Density Lipoprotein (HDL), Low-Density Lipoprotein (LDL) and very Low-Density Lipoprotein (VLDL) and complement component C3 and C4. The results revealed significant decrease in the total cholesterol, Triglycerides, LDL and non-significant in vLDL (129.96±1.63, 130.69± 2.80, 87.19±1.97, 29.24± 0.83 mg/dl respectively) and non-significant increase in HDL(24.22 ±0.62) mg/dl compared with control group(152.07± 1.63, 156.48± 6.55, 99.26 ±1.39, 31.49± 1.30 and 21.31±
... Show MoreIt has been revealed previously that chronic liver disease (CLD) may be associated to hormonal fluctuations. The current study, therefore, aimed to evaluate some hormones in CLD patients compared with non-CLD individuals. This case control study was conducted at Gastroenterology and Hepatology Teaching Hospital, Medical city, Baghdad, Iraq during December 2021 to May 2022. One hundred and twenty male patients with CLD (age:14-75 years) and 120 control males (age: 24-70 years) were involved in this study. Serum samples were taken from all individuals and were then analysed for many tests which included hormones (Cortisol, testosterone, prolactin, insulin and thyroid stimulating hormone TSH); biochemical analysis (Prothrombin time
... Show MoreBackground: Chronic kidney disease is a condition that results from an indefinite change in the structure and function of the kidneys. A slow, steady progression characterizes it and is irreversible. Objectives: This study aims to evaluate the findings of certain biochemical and hematological tests in samples from Iraqi CKD patients. Methods: This study included 90 subjects, where 70 patients with chronic kidney disease and 20 healthy individuals. Blood samples were collected from the patients during their visits to Ghazi Al-Hariri Surgical Specialties' Hospital- Medical City, Baghdad, Iraq. Age, sex and body mass index were assessed for each participant followed by renal function tests [serum blood urea, creatinine, uric acid a
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show More