Preferred Language
Articles
/
sBbcGocBVTCNdQwCdjfV
Evaluation of geomechanical properties for tight reservoir using uniaxial compressive test, ultrasonic test, and well logs data
...Show More Authors

Scopus
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Improving the Properties of Gypsum By Using Additives
...Show More Authors

Gypsum Plaster is an important building materials, and because of the availabilty of its raw materials. In this research the effect of various additives on the properties of plaster was studied , like Polyvinyl Acetate, Furfural, Fumed Silica at different rate of addition and two types of fibers, Carbon Fiber and Polypropylene Fiber to the plaster at a different volumetric rate. It was found that after analysis of the results the use of Furfural as an additive to plaster by 2.5% is the optimum ratio of addition to that it improved the flexural Strength by 3.18%.
When using Polyvinyl Acetate it was found that the ratio of the additive 2% is the optimum ratio of addition to the plaster, because it improved the value of the flexural stre

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
The Effects of Different Water Types on the Dissolution, Physical Appearance, and Compressive Strength of Gypsum Rock
...Show More Authors

Dissolution of gypsum rock in water is significant, which may result in hydrocarbon reservoir formation and evaporate deposits. However, the complexity of the gypsum dissolution process is still of interest because of its uncleanness that requires more critical analysis. The objectives of this experimental study are emphasis on the dissolution characteristics of gypsum rock under room temperature and by various types of water; namely: deionized, tap, fresh, acidic, well, and normal rainwatre. In addition, the influences of dissolution on gypsum rock's mechanical and physical characteristics. Gypsum rock was obtained from Agjalar area, in the southwest of Sulaymaniyah city, Northern Iraq. Experimental results show that we

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Profiles and Geotechnical Properties for some Basra Soils
...Show More Authors

 Abstract

Basra province is known for its logistic location for trading activity and oil industry. By geological point of view, Basra areas are believed to consist mainly of alternation of (clay, silty clay, clayey silt, silt and sand) type of soil. Any development of industry in this area should be affected by the occurrence of the clay soil. That is why the investigation to the soil is more than necessary. In this case, a vast testing program was carried out by the author to evaluate the various formations constituting the of some Basra soils. An attempt to characterize and discuss the nature, minerals, engineering behavior and field properties of soil samples extracted from more than one thousand and one

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 01 1997
Journal Name
Polymer-plastics Technology And Engineering
Feasibility of Dynamic Acid Corrosion Control in Oil Well Tubing
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Threshold Current Density of Al0.1Ga0.9N/GaN Triple Quantum Well Laser
...Show More Authors

Semiconductor laser is used in processing many issues related to the scientific, military, medical, industrial and agricultural fields due to its unique properties such as coherence and high strength where GaN-based components are the most efficient in this field. Current technological developments mention to the strong connection of GaN with sustainable electronic and optoelectronic devices which have high-efficiency. The threshold current density of Al0.1Ga0.9N/GaN triple quantum well laser structure was investigated to determine best values of the parameters affecting the threshold current density that are well width, average thickness of active region, cavity length, reflectivity of cavity mirrors and optical confinement factor. The opt

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Proposition of New Ensemble Data-Intelligence Models for Surface Water Quality Prediction
...Show More Authors

View Publication
Scopus (85)
Crossref (82)
Scopus Clarivate Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Wed Aug 01 2012
Journal Name
International Journal Of Geographical Information Science
Assessing similarity matching for possible integration of feature classifications of geospatial data from official and informal sources
...Show More Authors

View Publication
Scopus (63)
Crossref (51)
Scopus Clarivate Crossref