Preferred Language
Articles
/
ijcpe-62
Spatial Data Analysis for Geostatistical Modeling of Petrophysical Properties for Mishrif Formaiton, Nasiriya Oil Field
...Show More Authors

Spatial data analysis is performed in order to remove the skewness, a measure of the asymmetry of the probablitiy distribution. It also improve the normality, a key concept of statistics from the concept of normal distribution “bell shape”, of the properties like improving the normality porosity, permeability and saturation which can be are visualized by using histograms. Three steps of spatial analysis are involved here; exploratory data analysis, variogram analysis and finally distributing the properties by using geostatistical algorithms for the properties. Mishrif Formation (unit MB1) in Nasiriya Oil Field was chosen to analyze and model the data for the first eight wells. The field is an anticline structure with northwest- southeast general trend. Mishrif Formation is the important middle cretaceous carbonate formation in the stratigraphic column of southern Iraq. The result of applying spatial data analysis showed the nature and quantitative summary of data and so it would be easy to remove the skewness and improve the normality of the petrophysical properties for suitable distribution by the algorithms. It also showed that unit MB1 in Mishrif Fromation contains good properties in which high porosity (0.182) and permeability (7.36 md) with low values of water saturation (0.285) that make it suitable for the accumulation of oil.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
A careful study of the effect of the infectious diseases and refuge on the dynamical behavior of prey-scavenger modeling
...Show More Authors

In this paper, the dynamics of scavenger species predation of both susceptible and infected prey at different rates with prey refuge is mathematically proposed and studied. It is supposed that the disease was spread by direct contact between susceptible prey with infected prey described by Holling type-II infection function. The existence, uniqueness, and boundedness of the solution are investigated. The stability constraints of all equilibrium points are determined. In addition to establishing some sufficient conditions for global stability of them by using suitable Lyapunov functions. Finally, these theoretical results are shown and verified with numerical simulations.

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Personality Characteristics of the Leader in Business Organizations Entrepreneurship (Field Research)
...Show More Authors

This research is aiming to find the effective role of the personality characteristics of the Leader in business organization entrepreneurship by studying the effect of the special dimensions of personality characteristics (neuroticism, extraversion, openness, Agreeableness, and conscientiousness) on business organizations entrepreneurship dimensions representing in the two main dimensions (entrepreneurship direction and strategic entrepreneurship) across field study was conducted in thirteen private colleges in Baghdad.

The problem of the research relies in asking the question, is there an effect for Leader personality characteristics on business organizations entrepreneurship. and statistical methods hav

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Iraqi Journal Of Applied Physics
Effects of Magnetic Field on Growth and Electrical Characteristics of Tornado Gliding Arc Discharge
...Show More Authors

This study investigates the characterization and growth dynamics of a Magnetically Stabilized Gliding Arc Discharge (MSGAD) system, generating non-thermal plasma with argon gas under atmospheric pressure and flow rates of 1-5 L/min. The electrical properties and growth patterns concerning gas flow rates and applied voltages were examined utilizing a magnetic field for stability. Using a digital oscilloscope, a correlation between voltage reduction and increased current was uncovered. An algorithm analyzes digital images to compute arc length, area, and volume. Results reveal how gas flow rate and applied voltage directly impact arc growth. Furthermore, the magnetic field's role in guiding and stabilizing the plasma discharge was explored. T

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Optical properties of CdO thin films
...Show More Authors

Cadmium Oxide thin films were deposited on glass substrate by spray pyrolysis technique at different temperatures (300,350,400, 500)oC. The optical properties of the films were studied in this work. The optical band-gap was determined from absorption spectra, it was found that the optical band-gap was within the range of (2.5-2.56)eV also width of localized states and another optical properties.

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
FRACTURE PROPERTIES OF LOCAL ASPALT CONCRETE
...Show More Authors

The local asphalt concrete fracture properties represented by the fracture energy, J-integral, and stress intensity factor are calculated from the results of the three point bending beam test made for pre notches beams specimens with deformation rate of 1.27 mm/min. The results revealed that the stress intensity factor has increased by more than 40% when decreasing the testing temperature 10˚C and increasing the notch depth from 5 to 30mm. The change of asphalt type and content have a limited effect of less than 6%.

 

View Publication Preview PDF