Preferred Language
Articles
/
ijs-3139
Application of Neural Network Analysis for Seismic Data to Differentiate Reservoir Units of Yamama Formation in Nasiriya Oilfield A Case Study in Southern Iraq
...Show More Authors

      The EMERGE application from Hampsson-Russell suite programs was used in the present study. It is an interesting domain for seismic attributes that predict some of reservoir three dimensional or two dimensional properties, as well as their combination. The objective of this study is to differentiate reservoir/non reservoir units with well data in the Yamama Formation by using seismic tools. P-impedance volume (density x velocity of P-wave) was used in this research to  perform a three dimensional seismic model on the oilfield of Nasiriya by using post-stack data of  5 wells. The data (training and application) were utilized in the EMERGE analysis for estimating the reservoir properties of P-wave velocity, in addition to the neural network analysis and deriving relations between them at well locations. P- wave velocity slices of reservoir units (Yb1, Yb2, and Yc) of Yamama Formation were prepared to determine the enhancement trends within these units. From a general economic point of view, due to good prospecting in Cretaceous rocks, especially in Nasiriya oilfield, , Yamama Formation was found to contain hydrocarbon accumulation and can be considered as one of the most important reservoirs in southern Iraq.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
College Of Islamic Sciences
جدلية جدليّة العقل والنّقل وعلاقتهما بالاستدلال مسائل الاعتقاد بين مدرستي أهل الحديث والأشاعرة: - عرض ومناقشة
...Show More Authors

This research highlights one of the most important issues that have been controversial between Islamic schools, which is the duality of Intellect  and Revelation and the nature of their relationship, in two core points:

The first point: Could there be a real conflict between Intellect  and revelation? While the school of hadith view that this assumption is a rational assumption that does not real as long as the revelation is correct and the Intellect  is clear, and that what is claimed are due to other Intellect s, we find that the Ash’ari school adopts the saying that the real conflict may occur, but rather confirms its occurrence.

The second point: For whom is the priority, for the Intellect  or th

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
Post Cesarean Section Surgical Site Infection; Incidence and Risk Factors
...Show More Authors

The rate of births delivered by cesarean section (CS) has gone up substantially all over the world. Post-cesarean surgical site infection (SSI) is a common cause of maternal morbidity and mortality that results in prolonged period of hospitalization with increased cost and direct health implications, especially in low socioeconomic population, resource- restricted settings, and war- related conditions with internal forced movement. This study was aimed to find incidence of post cesarean section surgical site infection withthe accompanying risk factors.Pregnant ladies admitted to department of obstetrics and gynecology at Medical City Hospital in Baghdad who had undergone CSs were followed up prospectively from first of January 2017 till end

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
IRAQI CONSUMER AWARENESS OFF THE RISK ASSOCIATED WITH CONSUMING CANNED FOOD: IRAQI CONSUMER AWARENESS OFF THE RISK ASSOCIATED WITH CONSUMING CANNED FOOD
...Show More Authors

The aim of this research was to indicate the opinion of the Iraqi consumer awareness of the risks associated with consuming canned food, the questionnaire was included 20 questions for label information, consumer culture, shopping, marketing, awareness and knowledge as a tool to survey the opinions of 300 consumers in Baghdad, the data was analyzed by using percentage, weighted mean, and weight percent, the results obtained showed that the Iraqi consumer need more information, training and guidance programs in food safety handling issue for canned food, especially in analysis of label information and growing of consumer culture for shopping, right marketing, awareness and knowledge.

View Publication Preview PDF
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Self-organized learning strategies and self-competence among talented students
...Show More Authors

Investigating the strength and the relationship between the Self-organized learning strategies and self-competence among talented students was the aim of this study. To do this, the researcher employed the correlation descriptive approach, whereby a sample of (120) male and female student were selected from various Iraqi cities for the academic year 2015-2016.  the researcher setup two scales based on the previous studies: one to measure  the Self-organized learning strategies which consist of (47) item and the other to measure the self-competence that composed of (50) item. Both of these scales were applied on the targeted sample to collect the required data

View Publication Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Bacterial Infections Associated with Cutaneous Leishmaniasis
...Show More Authors

Background:Oriental sore occurs mostly in the
mediteranian region , North Africa ,and the Middle East .
Rodents are the main reservoir for the parasite . The wet
type caused by L. major is rural and the dry type caused by
L. tropica is urban and humans are presumably the only
reservoir. Sand fly vectors are involved in all forms.
Objectives: This study aimed to show the most
important bacterial infections concomitant with cutaneous
leishmaniasis .
Methods; The study was performed on 75 patients (ages
1-50 years ) from both sexes were attending Skin Diseases
Department of Ramadi General Hospital during the period
extended from January to June 2000. These patients were
clinically diagnosed as patients

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
On Nano Generalized Semi Generalized Closed Sets
...Show More Authors

In this paper we introduced a new class of - called - and study their basic properties in nano topological spaces. We also introduce -closure and -interior and study some of their fundamental properties.

View Publication Preview PDF
Publication Date
Fri Jul 07 2017
Journal Name
International Journal Of Science And Research (ijsr)
Automatic brain tumor segmentation from MRI Images using superpixels based split and Merge algorithm
...Show More Authors

RA Ali, LK Abood, Int J Sci Res, 2017 - Cited by 2

View Publication
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Linguistic Fuzzy Trust Model over Oscillating Wireless Sensor Networks
...Show More Authors

Simulation  of  the  Linguistic  Fuzzy Trust  Model  (LFTM)  over  oscillating  Wireless  Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 05 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Image Compression Based on Cubic Bezier Interpolation, Wavelet Transform, Polynomial Approximation, Quadtree Coding and High Order Shift Encoding
...Show More Authors

In this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t

... Show More
View Publication
Crossref (2)
Crossref