Preferred Language
Articles
/
o4beSoYBIXToZYALxIFG
Laboratory-Based Correlations to Estimate Geomechanical Properties for Carbonate Tight Reservoir.
...Show More Authors

Rock mechanical properties are critical parameters for many development techniques related to tight reservoirs, such as hydraulic fracturing design and detecting failure criteria in wellbore instability assessment. When direct measurements of mechanical properties are not available, it is helpful to find sufficient correlations to estimate these parameters. This study summarized experimentally derived correlations for estimating the shear velocity, Young's modulus, Poisson's ratio, and compressive strength. Also, a useful correlation is introduced to convert dynamic elastic properties from log data to static elastic properties. Most of the derived equations in this paper show good fitting to measured data, while some equations show scatters in correlating the data due to the presence of Calcite, Quartz, and clay in some core samples. Brittleness index (BRI) indicates ductile behavior of the core samples is also studied for the interested reservoir. The results of BRI show that the samplers range from moderate to high brittleness, and the difference in BRI comes from the presence of some minerals, as explained using the X-ray diffraction test (XRD). The proposed correlations are compared to other correlations from literature for validation, and the results of the comparison show good matching that explains the accuracy of the proposed equations.

Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Oct 07 2018
Journal Name
Al-kindy College Medical Journal
Risedronate as a therapeutic trial post-hysterectomy in premenopausal women to prevent osteoporosis
...Show More Authors

Background: Osteoporosis is a skeletal defect manifested by a reduction of bone strength as a result of reduced bone mass to the extent that there is a higher risk of fracture even on minor trauma. Hysterectomy in a premenopausal woman is a well known cause of ovarian failure resulting in an increased risk of osteoporosis.

Objective : To clarify bisphosphonate's preventive effect on osteopenia and osteoporosis in premenopausal women after hysterectomy.

Type of the study: Cross –sectional study.

Method:  84 premenopausal females post hysterectomy aged between 40 – 50 years, were enrolled in this randomized controlled double blinded trail a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
Modeling the Contamination of Soil Adjacent to Mohammed AL-Qassim Highway in Baghdad
...Show More Authors

The aim of this paper is to estimate the concentrations of some heavy metals in Mohammed AL-Qassim Highway in Baghdad city for different distances by using the polynomial interpolation method for functions passing from the data, which is proposed by using the MATLAB software. The sample soil in this paper was taken from the surface layer (0-25 cm depth) at the two sides of the road with four distances (1.5, 10, 25 and 60 m) in each  side of the road. Using this method, we can find the concentrations of heavy metals in the soil at any depth and time without using the laboratory, so this method reduces the time, effort and costs of conducting laboratory analyzes.

Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Proceedings Of The 1st International Conference On Frontier Of Digital Technology Towards A Sustainable Society
The most ABO blood group susceptibility to COVID-19 infections in Baghdad city
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Jun 30 2011
Journal Name
Al-kindy College Medical Journal
The Expression of Epstein-Barr virus in Breast cancer in relation to age
...Show More Authors

Background: Breast cancer is the most common
malignancy affecting females worldwide. The association
of Epstein-Barr virus (EBV) with this cancer is a longstanding
interest to this field.
Aim: to investigate the presence of EBV in breast tumor
tissue in relation to age.
Patients and Methods: Paraffin-embedded tissue blocks
from 45 female patients with breast tumors (ranged in age
from 28 to 85 years) were retrieved. The cases were
grouped into two categories: group (A): included 30 cases
with breast carcinoma and group (B): included 15 cases
with benign breast diseases as a control group .The
expression of EBV protein was examined
immunohistochemically.
Results: Twelve (40%) of the 30 breast canc

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Geopolitical dimensions to build a dam on the downstream Renaissance (Egypt and Sudan)
...Show More Authors

Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
World Neurosurgery
The Ventriculoperitoneal Shunt Complication Rate in Baghdad Medical City from 2019 to 2022
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Developing a Prosthesis Design using A Gearbox to Replicate the Human Hand Mechanism
...Show More Authors

Prosthetic is an artificial tool that replaces a member of the human frame that is  absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number  of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients.  This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
One Algorithm to Cipher Messages in Columnar and Fixed Period-d Transposition Cipher
...Show More Authors

    One of ciphering systems depends on transposition of letters in plain text to generate cipher text. The programming of transposition depends mainly on 2-dimension matrix in either methods but the difference is in columnar .We print columns in the matrix according to their numbers in key but in the fixed, the cipher text will be obtained by printing matrix by rows.

View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
identification of fungi and their toxins associated with imported rice grain to iraq
...Show More Authors

The study included the investigation of fungi ringed and inventory and Aflatoxins in rice and recorded average temperatures and humidity 22.75 degree Celsius and 13.2% respectively were obtained 1356 isolation innate possible diagnosis 15 species inherent in rice imported back to 8 races represented races b Fusarium , Cladosporium, Aspergillus and Alternaria

View Publication Preview PDF