Preferred Language
Articles
/
sBbcGocBVTCNdQwCdjfV
Evaluation of geomechanical properties for tight reservoir using uniaxial compressive test, ultrasonic test, and well logs data
...Show More Authors

Scopus
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Permeability Determination of Tertiary Reservoir/Ajeel Oil Field
...Show More Authors

This paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Sediment Transport within the Reservoir of Mandali Dam
...Show More Authors

Mandali Dam is one of the small dams in Iraq; it is located on Haran Wadi, Gangir, just 3km north-east Mandali City. Mandali dam consists of four main parts, the dam body, the intake structure, the spillway, and the bottom outlet. The dam body is zoned earth filled with a central core.  The main purposes of the dam are to maintain flow of Wadi Haran, supplying irrigation and drinking water to Mandali City, and recharging the groundwater. Over a period of seven years of operation, the dam lost its ability to store water due to accumulated sediments within its reservoir. The accumulated sediment is about 2.25million m3. The average annual rate of reduction during this period is about 0.321

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Electronics,computer Networking And Applied Mathematics
Comparison of Some Estimator Methods of Regression Mixed Model for the Multilinearity Problem and High – Dimensional Data
...Show More Authors

In order to obtain a mixed model with high significance and accurate alertness, it is necessary to search for the method that performs the task of selecting the most important variables to be included in the model, especially when the data under study suffers from the problem of multicollinearity as well as the problem of high dimensions. The research aims to compare some methods of choosing the explanatory variables and the estimation of the parameters of the regression model, which are Bayesian Ridge Regression (unbiased) and the adaptive Lasso regression model, using simulation. MSE was used to compare the methods.

View Publication
Crossref
Publication Date
Wed Aug 01 2012
Journal Name
International Journal Of Geographical Information Science
Assessing similarity matching for possible integration of feature classifications of geospatial data from official and informal sources
...Show More Authors

View Publication
Scopus (65)
Crossref (53)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Fri Sep 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Vapor-Liquid-Liquid Equilibrium (VLLE) Data for the Systems Ethyl acetate + Water, Toluene + Water and Toluene + Ethyl acetate + Water at 101.3 kPa. Using Modified Equilibrium Still
...Show More Authors

Isobaric Vapor-Liquid-Liquid equilibrium data for the binary systems ethyl acetate + water, toluene + water and the ternary system toluene + ethyl acetate + water were determined by a modified equilibrium still, the still consisted of a boiling and a condensation sections supplied with mixers that helped to correct the composition of the recycled condensed liquid and the boiling temperature readings in the condensation and boiling sections respectively. The VLLE data where predicted and correlated using the Peng-Robinson Equation of State in the vapor phase and one of the activity coefficient models Wilson, NRTL, UNIQUAC and the UNIFAC in the liquid phase and also were correlated using the Peng-Robinson Equation of State in both the vapo

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Evaluation of home-mode ELISA system for thedetection of antibodies against Escherichia coli O157:H7 using purified lipopolysaccharide
...Show More Authors

An enzyme linked immunosorbent assay (ELISA) for the detection and quantitation of human immunoglobulin G (IgG) antibodies against vero- cytotoxine (VT) producing Escherichia coli serogroup O157:H7 was produced. E. coli O157: H7 lipopolysaccharide was extracted from locally isolated strains by using hot phenol- water method, followed by partial purification using gel filtration chromatography by sepharose- 4B. The purity of the lipopolysaccharide was checked by measuring the protein and nucleic acid content and then used as antigen. Four isolates of vero- cytotoxin producing E. coli serogroup O157:H7 was obtained by culturing 350 stool samples from children suffering from bloody diarrhea. These isolates were identified on bacteriological, s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
Data Analytics and Blockchain: A Review
...Show More Authors

Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and

... Show More
View Publication
Scopus (3)
Scopus Crossref