Preferred Language
Articles
/
2xYLGYcBVTCNdQwCFTaH
ESTIMATION OF SHEAR WAVE VELOCITY FROM WIRELINE LOGS DATA FOR AMARA OILFIELD, MISHRIF FORMATION, SOUTHERN IRAQ
...Show More Authors

Shear wave velocity is an important feature in the seismic exploration that could be utilized in reservoir development strategy and characterization. Its vital applications in petrophysics, seismic, and geomechanics to predict rock elastic and inelastic properties are essential elements of good stability and fracturing orientation, identification of matrix mineral and gas-bearing formations. However, the shear wave velocity that is usually obtained from core analysis which is an expensive and time-consuming process and dipole sonic imager tool is not commonly available in all wells. In this study, a statistical method is presented to predict shear wave velocity from wireline log data. The model concentrated to predict shear wave velocity from petrophysical parameters and any pair of compressional wave velocity, porosity and density in carbonate rocks. The established method can estimate shear wave velocity in carbonate rocks with a correlation coefficient of close to unity.

Crossref
View Publication
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Estimation of Time of Survival Rate by Using Clayton Function for the Exponential Distribution with Practical Application
...Show More Authors

Each phenomenon contains several variables. Studying these variables, we find mathematical formula to get the joint distribution and the copula that are a useful and good tool to find the amount of correlation, where the survival function was used to measure the relationship of age with the level of cretonne in the remaining blood of the person. The Spss program was also used to extract the influencing variables from a group of variables using factor analysis and then using the Clayton copula function that is used to find the shared binary distributions using multivariate distributions, where the bivariate distribution was calculated, and then the survival function value was calculated for a sample size (50) drawn from Yarmouk Ho

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Engineering
A Prediction Formula for The Estimation of Sediment Load in The Upper Reach of Al-Gharraf River
...Show More Authors

The presence of deposition in the river decreases the river flow capability's efficiency due to the absence of maintenance along the river. In This research, a new formula to evaluate the sediment capacity in the upstream part of Al-Gharraf River will be developed. The current study reach lies in Wasit province with a distance equal to 58 km. The selected reach of the river was divided into thirteen stations. At each station, the suspended load and the bedload were collected from the river during a sampling period extended from February 2019 till July 2019. The samples were examined in the laboratory with a different set of sample tests. The formula was developed using data of ten stations, and the other three s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Data And Network Science
The effects of big data, artificial intelligence, and business intelligence on e-learning and business performance: Evidence from Jordanian telecommunication firms
...Show More Authors

This study sought to investigate the impacts of big data, artificial intelligence (AI), and business intelligence (BI) on Firms' e-learning and business performance at Jordanian telecommunications industry. After the samples were checked, a total of 269 were collected. All of the information gathered throughout the investigation was analyzed using the PLS software. The results show a network of interconnections can improve both e-learning and corporate effectiveness. This research concluded that the integration of big data, AI, and BI has a positive impact on e-learning infrastructure development and organizational efficiency. The findings indicate that big data has a positive and direct impact on business performance, including Big

... Show More
View Publication
Scopus (41)
Crossref (37)
Scopus Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
Callus Induction and Shoot Formation for Mexican Red Bean (Phaseolus vulgaris L.) Pinto Cultivar in Vitro
...Show More Authors

The current study aimed to adopt a method for inducing callus cells and regenerating the important common red bean using different types of growth regulators such as N6-benzylaminopurine (BAP), Naphthalene acetic acid (NAA), and Thidiazuron (TDZ). Different types of common bean pinto cultivar explants, such as internodes, cotyledons and roots, were inoculated on Murashige and Skoog medium (MS) provided with different combinations of plant growth regulators, including 1- BAP (5 mg/l) 2-BAP (4.5 mg/l) NAA (0.5 mg/l), 3- BAP (4.5 mg/l), and TDZ (0.1mg/l). Callus was initiated on MS culture medium supplied with 5 mg/l BAP for all explants (internodes, cotyledons, and roots) at 50, 20, and 10% respectively, while adding NAA with 0.5mg/l showed

... Show More
Publication Date
Thu Jun 01 2017
Journal Name
Nuclear Physics A
Alpha-cluster preformation factor within cluster-formation model for odd-A and odd–odd heavy nuclei
...Show More Authors

View Publication
Scopus (52)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Thu Apr 25 2019
Journal Name
University Of Thi-qar Journal
Evaluation the Geotechnical Properties of Oil-Polluted Soil from Two Selected Areas in Thi-Qar Governorate-Iraq
...Show More Authors

Oil pollution of the soil due to a leakage in oil tubes, transportation of products, or during oil excavations can change the soil physical and mechanical, chemical, and biological properties. Consequently, the soil may or may not be eligible for engineering construction projects and it may need a significant treatment. Therefore, it is required to have a better understanding of the general behavior and the corresponding geotechnical properties upon pollution particularly for those areas associated with oil explorations and industry like Thi-Qar Governorate. Fine and coarse soils from two sites at the University of Thi-Qar are artificially contaminated with oil products ranging from 0% to 10% of their dry weight. Testing programs have been

... Show More
View Publication
Publication Date
Wed Sep 23 2020
Journal Name
Artificial Intelligence Research
Hybrid approaches to feature subset selection for data classification in high-dimensional feature space
...Show More Authors

This paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe

... Show More
View Publication
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref