Lost circulation or losses in drilling fluid is one of the most important problems in the oil and gas industry, and it appeared at the beginning of this industry, which caused many problems during the drilling process, which may lead to closing the well and stopping the drilling process. The drilling muds are relatively expensive, especially the muds that contain oil-based mud or that contain special additives, so it is not economically beneficial to waste and lose these muds. The treatment of drilling fluid losses is also somewhat expensive as a result of the wasted time that it caused, as well as the high cost of materials used in the treatment such as heavy materials, cement, and others. The best way to deal with drilling fluid losses
... Show MoreEvolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E
... Show MoreTwo EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe aim of our current study was to identify the effect of particulate matter of both types (PM2.5 and PM10) resulting from hookah smoking on the hemopoietic system of workers (smokers) in closed cafes. This study included six stations (cafes) on the Rusafa side of Baghdad city and conducted a blood test that included a complete blood count (CBC). A multifunctional air quality detector measured both types of particulate matter in the morning and evening. The study included 30 men (workers and smokers) and 30 men (non-smokers), whose ages ranged from 20 to 40 years. The study found that smokers had an increase in white blood cells and red blood cells, as well as an increase in the percentage of hemoglobin (HGB), hematocrit (HCT), the mean co
... Show More Purpose - The study aimed at evaluating the accounting system of the Iraqi political parties, which is applied according to legislative texts, and then the ability to provide accounting information to evaluate the strategic performance and control of the party's operational and financial performance.
Findings- The research found that the unified accounting system applied to political parties does not provide relevance informations to judge the performance of the political party, the researcher a proposal for an accounting system that provides the necessary information to measure and monitor the performance of Iraqi political parties can be presented. The
In this paper, we deal with a dynamical system that can demonstrate a chaotic attractor of Rossleroscillator. We simulate the Rosslerequations numerically then we investigate the model experimentally. Numerically, the Rossler parameter a and b were fixed and c was changed.The evolution of the system exhibits period, period-doubling, second period doubling, and chaos when control parameters are changed. This evolution can be seen by analyze the time series, the bifurcation diagrams and phase space. Experimentally, the evolution of the system exhibited the same numerical behavior by changing the resistance (Rv) in Rossler circuit that represent as control parameter.