Preferred Language
Articles
/
joe-174
Bit Record Analysis for Bits Evaluating and Selection
...Show More Authors

The bit record is a part from the daily drilling report which is contain information about the type and the number of the bit that is used to drill the well, also contain data about  the used weight on bit  WOB ,revolution per minute RPM , rate of penetration ROP, pump pressure ,footage drilled and bit dull grade. Generally we can say that the bit record is a rich brief about the bit life in the hole. The main purpose of this research is to select the suitable bit to drill the next oil wells because the right bit selection avoid us more than one problems, on the other hand, the wrong bit selection cause more than one problem. Many methods are related to bit selection, this research is familiar with four of those methods, which they are: specific energy method, bit dullness way, cost per foot method, offset well bit record and geological information way. Five oil wells have been studied in Rumaila Oil Field in South of Iraq which they are R-531, R-548, R-536, R-544 and R-525. The wells R-531, R-536 and R-525 are vertical wells; the wells R-548 and R-544 are directional wells at angle of inclination 8.79and 16.62 respectively.  

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 25 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences (ihjpas)
Spectrophotometric Investigations for Simultaneous Analysis of Certain Antibacterial: A Brief Review
...Show More Authors

Antibacterial substances belong to a group of compounds that attack dangerous microorganisms. Therefore, killing bacteria or reducing their metabolic activity will lessen their adverse effects on a biological system. They originated from either synthetic materials, microbes, or mold. Many of these medications treat the gram-negative bacteria from the critical precedence group, such as pseudomonas, carbapenem-resistant acinetobacter, and enterobacterales. This study aims to investigate the simultaneous analysis of specific antibacterial spectrophotometrically. The WHO maintains this list of priority infections with antibiotic resistance. Drug combinations in single dosage forms are becoming increasingly popular in the pharmaceutical industry

... Show More
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Emergency Medicine, Trauma And Acute Care
Histological variety analysis for pleomorphic adenoma in salivary glands: Retrospective study
...Show More Authors

Pleomorphic adenoma (PA) is the most frequent benign epithelial neoplasm of salivary glands, displaying a remarkable degree of morphological variety. The aim of the study is to illustrate the clinicopathological characteristics of PA with particular emphases on epithelial cell morphology and mesenchymal elements. Materials and Methods: A total of 132 PA collected between 2002 and 2017 were recruited from Al Shahid Ghazi Al Hariri Hospital and the Department of Oral Pathology, College of Dentistry, Baghdad University, Baghdad, Iraq, and analyzed for their demographic and histopathological features. All data were analyzed using descriptive statistics. A slightly higher incidence of PA was detected in females (52.3%) compared to male subject

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
A Comparative Analysis of the Zernike Moments for Single Object Retrieval
...Show More Authors

Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s

... Show More
View Publication Preview PDF
Crossref (2)
Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Evaluation of FEMM software for magnetic analysis of the magnetorheological application
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Oct 12 2022
Journal Name
Axioms
Razy: A String Matching Algorithm for Automatic Analysis of Pathological Reports
...Show More Authors

Pathology reports are necessary for specialists to make an appropriate diagnosis of diseases in general and blood diseases in particular. Therefore, specialists check blood cells and other blood details. Thus, to diagnose a disease, specialists must analyze the factors of the patient’s blood and medical history. Generally, doctors have tended to use intelligent agents to help them with CBC analysis. However, these agents need analytical tools to extract the parameters (CBC parameters) employed in the prediction of the development of life-threatening bacteremia and offer prognostic data. Therefore, this paper proposes an enhancement to the Rabin–Karp algorithm and then mixes it with the fuzzy ratio to make this algorithm suitable

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Samples of Al Samarqandi’s Selection in some of Washing Laws and the touch of the Grecians Quran in his book (The scholars’ Masterpiece)
...Show More Authors

The Research is interested in the detailed comparative study of certain selection of
Imam Alsamarqandi in some subjects of washing and touching the Gracious Quran.
The value of this study is that it is related to one aspect of the duties obliged on Muslim
like parity.
The study has tried to collect certain scholars’ opinions of eight doctrines with the
selection of Alsamarqandi to make a comp arson between them and to show how
Alsamarqandi is able to create legal laws from his sources to lead the researchers nto have
knowledge about the syllabi of the famous scientists.
Finally we ask God to bless to what is right and to accept this study and make it part of
our good deeds, Ameen.

View Publication Preview PDF
Publication Date
Tue Nov 11 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluating the effect of silver nanoparticles incorporation on antifungal activity and some properties of soft denture lining material
...Show More Authors

Background: Colonization of soft denture liners by Candida albicans and other microorganisms continued to be a serious problem. The aim of this study was to evaluate the effect of incorporating silver nanoparticles into heat cured acrylic-based soft denture liner on the antifungal activity, and on water sorption, solubility, shear bond strength and color change of the soft lining material. Furthermore, evaluating the amount of silver released. Materials and methods: Silver nanoparticles were incorporated into soft denture liner in different percentages (0.05%, 0.1% and 0.2% by weight). Four hundred and twenty specimens were prepared and divided into five groups according to the test to be performed. The antifungal activity of the soft liner

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Convergence Analysis for the Homotopy Perturbation Method for a Linear System of Mixed Volterra-Fredholm Integral Equations
...Show More Authors

           In this paper, the homotopy perturbation method (HPM) is presented for treating a linear system of second-kind mixed Volterra-Fredholm integral equations. The method is based on constructing the series whose summation is the solution of the considered system. Convergence of constructed series is discussed and its proof is given; also, the error estimation is obtained. Algorithm is suggested and applied on several examples and the results are computed by using MATLAB (R2015a). To show the accuracy of the results and the effectiveness of the method, the approximate solutions of some examples are compared with the exact solution by computing the absolute errors.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref