APDBN Rashid, The College of Arts/ Al-Mustansiriyya University, 2004
Shiranish has been studied at Hijran section near Erbil city, NE Iraq. Fifty two thin-sections were prepared to study them under polarized microscope, to determine the petrographic component, organic content and digenetic processes. Rock units subdivided into four rock beds, as follows: dolostone, foraminiferal biomicrite, poorly washed biomicrite and micrite. Vertical succession of Shiranish Formation refers to off-shore quite marine environment.
The aim of this study is to investigate the feasibility of underground storage of gas in Um El-Radhuma formation /Ratawi field. This formation is an aquifer consisting of a high permeable dolomitebeds overlain by impermeable anhydrite bed of Rus formation. Interactive petrophysics (IP), Petrel REand Eclipse 100 softwares were used to conduct a well log interpretation, build a reservoir simulationmodel and predict the reservoir behavior during storage respectively. A black oil, three dimensionaland two phase fluid model has been used. The results showed that the upper part of Um El-Radhumaformation is suitable for underground gas storage, because of the seal of its cap rock and capability ofreserving gas in the reservoir. It was foun
... Show MoreShiranish Formation (Late Campanian- Maastrichtian) that cropping out north east Iraq, is studied by microfacies analysis of 52 thin section collected from Hijran Section, about 10 km west Shaqlawa Town, Governorate of Erbil. According to petrography, mineralogy and organic contents, rocks are subdivided to crystalline carbonate and microfacies units (biowackstone, packstone, and mudstone facies). Biowackstone facies have high ratio of the rock components, while the other facies have low ratio. Microfacies analysis led to relatively quiet deep marine environment.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreWith the study of synthesizing new organic compounds and exploring biological potency. Aryldiazenyl derivatives (2-5) were carried out by coupling of diazonium salt of 4-aminoacetophenone (1) and miscellaneous active methylene compounds such as: acetylacetone, ethyl cyanoacetate, dimedone or methyl acetoacetate. Moreover substituted 1,2,3-triazole (7-9) were synthesized by the cyclization of 1-(4-azidophenyl) ethanone (6); (which was obtained by coupling of diazonium salt (1) with sodium azid); with acetylacetone, methyl acetoacetate or methyl cyanoacetate, respectively. The structures of the prepared compounds were promoted by IR, H1NMR and UV/Visible spectra. Further, they were examined in vetro for antibacterial activity against five str
... Show MoreThe pandemic SARS-CoV-2 is highly transmittable with its proliferation among nations. This study aims to design and exploring the efficacy of novel nirmatrelvir derivatives as SARS entry inhibitors by adapting a molecular modeling approach combined with theoretical design. The study focuses on the preparation of these derivatives and understanding their effectiveness, with a special focus on their binding affinity to the S protein, which is pivotal for the virus’s access to the host cell. Considering molecular docking aspects in the scope of a study on nirmatrelvir derivatives and S protein, dynamics simulations with 25 nanoseconds of their binding are explored. The study shows that these derivatives might work as effective antivi
... Show More