Preferred Language
Articles
/
joe-1911
Prediction Unconfined Compressive Strength for Different Lithology Using Various Wireline Type and Core Data for Southern Iraqi Field
...Show More Authors

Unconfined Compressive Strength is considered the most important parameter of rock strength properties affecting the rock failure criteria.  Various research have developed rock strength for specific lithology to estimate high-accuracy value without a core.  Previous analyses did not account for the formation's numerous lithologies and interbedded layers. The main aim of the present study is to select the suitable correlation to predict the UCS for hole depth of formation without separating the lithology. Furthermore, the second aim is to detect an adequate input parameter among set wireline to determine the UCS by using data of three wells along ten formations (Tanuma, Khasib, Mishrif, Rumaila, Ahmady, Maudud, Nahr Umr, Shuaiba and Zubair). After calibration with core test, the results revealed that Young’s Modulus correlations are the best to predict UCS with RMSE (53.23 psi).

Furthermore, the result showed that using the static Young Modulus as an input parameter in predicting UCS gives a closer result to the laboratory test than using a sonic log. This study found that many previous equations were developed for only one type of rock and tended to generalize poorly to the broader database. This study also provided more accurate rock strength estimation, leading to better prognosis in operational strategies and hydraulic fracturing location planning in oil well development when geomechanical analysis needs to be addressed where no core is available. Finally, the expected continuous rock mechanical profile indicates the formation's strength and stability around the wellbore.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 01 2021
Journal Name
Energy Reports
Global solar radiation prediction over North Dakota using air temperature: Development of novel hybrid intelligence model
...Show More Authors

View Publication
Scopus (79)
Crossref (81)
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Using modern techniques for determining the location of marketing outlet for product of the state company for vegetables oil
...Show More Authors

Were arranged this study on two sections, which included first section comparison between markets proposed through the use of transport models and the use of the program QSB for less costs , dependant the optimal solution  to chose the suggested market  to locate new market that achieve lower costs in the transport of goods from factories (ALRasheed ,ALAmeen , AlMaamun ) to points of sale, but the second part has included comparison of all methods of transport (The least cost method ,Vogels method , Results Approximations method , Total method) depending on the agenda of transport, which includes the market proposed selected from the first section and choose the way in which check the solution first best suited in terms

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
The Journal Of The College Of Basic Education
Polymorphism of IL-4 -590 (C>T) gene in Iraqi children with Type 1 Diabetes Mellitus
...Show More Authors

This study included 50 blood serum samples that collected from children with age ranged between 7-12 years. Thirty five samples collected from children with Type 1 Diabetes Mellitus (T1D), and 15 blood serum samples collected from healthy children as a control sample. The polymorphism of IL-4 -590 (C>T) gene, which amplified by using amplification refractory mutation system (ARMS-PCR) was showed high percentage of C allele frequency in T1D patients sample in comparison with T allele frequency, and the C allele revealed as etiological faction with risk by having T1D disease, whereas the T allele showed high frequency from the C allele frequency in control sample, and the T allele revealed as preventive faction from infection by this disease.

... Show More
Preview PDF
Publication Date
Wed Jan 28 2026
Journal Name
Journal Of Physical Education
The Effect Of Absolute Strength Training On Knee Injuries Rehabilitation And Special Strength In Muay Thai Fighters
...Show More Authors

View Publication
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sun May 11 2025
Journal Name
Iraqi Statisticians Journal
Estimating General Linear Regression Model of Big Data by Using Multiple Test Technique
...Show More Authors

View Publication
Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sun Jul 31 2016
Journal Name
International Journal Of Advanced Research
Attenuation Coefficient of Reactive Powder Concrete Using Different Energies.
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Mon Dec 01 2008
Journal Name
Al-khwarizmi Engineering Journal
Extraction of Phenol From Industrial Water Using Different Solvents
...Show More Authors

The analysis and efficiency of phenol extraction from the industrial water using different solvents, were investigated. To our knowledge, the experimental information available in the literature for liquid-liquid equilibria of ternary mixtures containing the pair phenol-water is limited. Therefore the purpose of the present investigation is to generate the data for the water-phenol with different solvents to aid the correlation of liquid-liquid equilibria, including phase diagrams, distribution coefficients of phenol, tie-lines data and selectivity of the solvents for the aqueous phenol system.

                The ternary equilibrium diagrams and tie-lines

... Show More
View Publication Preview PDF