Preferred Language
Articles
/
joe-1911
Prediction Unconfined Compressive Strength for Different Lithology Using Various Wireline Type and Core Data for Southern Iraqi Field
...Show More Authors

Unconfined Compressive Strength is considered the most important parameter of rock strength properties affecting the rock failure criteria.  Various research have developed rock strength for specific lithology to estimate high-accuracy value without a core.  Previous analyses did not account for the formation's numerous lithologies and interbedded layers. The main aim of the present study is to select the suitable correlation to predict the UCS for hole depth of formation without separating the lithology. Furthermore, the second aim is to detect an adequate input parameter among set wireline to determine the UCS by using data of three wells along ten formations (Tanuma, Khasib, Mishrif, Rumaila, Ahmady, Maudud, Nahr Umr, Shuaiba and Zubair). After calibration with core test, the results revealed that Young’s Modulus correlations are the best to predict UCS with RMSE (53.23 psi).

Furthermore, the result showed that using the static Young Modulus as an input parameter in predicting UCS gives a closer result to the laboratory test than using a sonic log. This study found that many previous equations were developed for only one type of rock and tended to generalize poorly to the broader database. This study also provided more accurate rock strength estimation, leading to better prognosis in operational strategies and hydraulic fracturing location planning in oil well development when geomechanical analysis needs to be addressed where no core is available. Finally, the expected continuous rock mechanical profile indicates the formation's strength and stability around the wellbore.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Mon Jul 28 2025
Journal Name
Journal Of Physical Education
The Effect Of Absolute Strength Training On Knee Injuries Rehabilitation And Special Strength In Muay Thai Fighters
...Show More Authors

View Publication
Publication Date
Fri Dec 01 2017
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Synthesis, Characterization and Study of Mesomorphic Behavior of New Bent and Liner Core Compounds Containing Heterocyclic
...Show More Authors

We described herein the synthesized and characterized of new bent and liner core compounds containing thiazolidin-4-one ring[XI-XIII] and [XIV-XVI] respectively. These compounds synthesized by sequence reactions starting from reaction resorcinol or hydroquinone with chloracetyl chloride to yield compounds [I] and [II] ,then the later compounds reactant with 4-hydroxybenzylaldehyde to product dialdehyde compounds [III] and [IV] .The Schiff bases compounds[V-VII] and [VIII-X] synthesized from reaction the compound [III] or [IV] with different aromatic amines, while the bent and liner core mesogens containing thiazolidin-4-one ring [XI-XIII] and [XIV-XVI] synthesized from reaction Schiff bases compounds[V-VII] or [VIII-X] with thioglycolic aci

... Show More
Publication Date
Sun Oct 01 2023
Journal Name
Journal Of Photochemistry And Photobiology A: Chemistry
Facile assembly of CoS/Ag2MoO4 nanohybrids for visible light-promoted Z-type-induced synergistically improved photocatalytic degradation of antibiotics
...Show More Authors

View Publication
Scopus (36)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Biochemical And Cellular Archives
ASSOCIATION OF SERUM INSULIN-LIKE GROWTH FACTOR-1 WITH OBESITY IN TYPE 2 DIABETIC IRAQI PATIENTS AND ACUTE RENAL FAILURE
...Show More Authors

ABSTRACT : Diabetes mellitus stands for a set of metabolic diseases that if they are not managed, they can initiate threatening life problems. This study hypothesizes that insulin-like growth factor-1 level can be used as a biomarker for early diagnosing renal problems in patients with type 2 diabetic disease. This study included 30 recently identified type 2 diabetic patients with acute renal malfunction who had an entrance in National Diabetic Center,AL-Mustansiriyah University.They have beenin the Center from October 2018 up to end of April 2019. Their age range has been (40-62) years. Comprehensive clinical investigationhas beencompleted for each patient to discount other diabetic complications like cardiac, neurologic and eye complicat

... Show More
Preview PDF
Publication Date
Sun Feb 27 2011
Journal Name
University Of Baghdad
Determination of Cimetidine and Erythromycin ethylsuccinate Drugs Using Different Spectrophotometric Methods (Ph.D. Thesis)
...Show More Authors

In this study, four different spectrophotometric methods were applied for determination of cimetidine and erythromycin ethylsuccinate drugs in pure form and in their pharmaceutical preparations. The suggested methods are simple, sensitive, accurate, not time consuming and inexpensive. The results showed the following: The first method: Based on the formation of ion pair complex of each drug with bromothymol blue (BTB) as a chromogenic reagent. The formed complexes were extracted with chloroform and their absorbance values were measured at 427.5 nm for cimetidine and 416.5nm for erythromycin ethylsuccinate; against their reagents blanks. Two different methods, univariate method and multivariate method, were used to obtain the optimum condit

... Show More
Preview PDF
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using GABOR Filter And Different Self Organizing Maps Neural Networks
...Show More Authors

 

This work implements the face recognition system based on two stages, the first stage is feature extraction stage and the second stage is the classification stage. The feature extraction stage consists of Self-Organizing Maps (SOM) in a hierarchical format in conjunction with Gabor Filters and local image sampling. Different types of SOM’s were used and a comparison between the results from these SOM’s was given.

The next stage is the classification stage, and consists of self-organizing map neural network; the goal of this stage is to find the similar image to the input image. The proposal method algorithm implemented by using C++ packages, this work is successful classifier for a face database consist of 20

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Simultaneous Determination of Binary Mixture of Estradiol and Progesterone Using Different Spectrophotometric Methods
...Show More Authors

Four rapid, accurate and very simple derivative spectrophotometric techniques were developed for the quantitative determination of binary mixtures of estradiol (E2) and progesterone (PRG) formulated as a capsule. Method I is the first derivative zero-crossing technique, derivative amplitudes were detected at the zero-crossing wavelength of 239.27 and 292.51 nm for the quantification of estradiol and 249.19 nm for Progesterone. Method II is ratio subtraction, progesterone was determined at λmax 240 nm after subtraction of interference exerted by estradiol. Method III is modified amplitude subtraction, which was established using derivative spectroscopy and mathematical manipulations. Method IIII is the absorbance ratio technique, absorba

... Show More
View Publication Preview PDF
Crossref (1)
Crossref