Preferred Language
Articles
/
6hYhGYcBVTCNdQwCrDYT
A Predictive Model for Estimating Unconfined Compressive Strength from Petrophysical Properties in the Buzurgan Oilfield, Khasib Formation, Using Log Data
...Show More Authors

Unconfined compressive strength (UCS) of rock is the most critical geomechanical property widely used as input parameters for designing fractures, analyzing wellbore stability, drilling programming and carrying out various petroleum engineering projects. The USC regulates rock deformation by measuring its strength and load-bearing capacity. The determination of UCS in the laboratory is a time-consuming and costly process. The current study aims to develop empirical equations to predict UCS using regression analysis by JMP software for the Khasib Formation in the Buzurgan oil fields, in southeastern Iraq using well-log data. The proposed equation accuracy was tested using the coefficient of determination (R²), the average absolute relative error (AARE%) and the standard deviation error (SD%). It has been found that the developed equation is reliable and capable of predicting the UCS with an acceptable degree of confidence R², AARE% and SD% are 0.8549, 2.619%, and 0.0569%, respectively when compared with field data. Furthermore, when compared to other known correlations, showed better prediction results.

Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Desalination And Water Treatment
Combination of the artificial neural network and advection-dispersion equation for modeling of methylene blue dye removal from aqueous solution using olive stones as reactive bed
...Show More Authors

Scopus (15)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Baghdad College Of Dentistry
In Vitro Comparative Assessment of the Effect of Gutta-Fusion Obturation on the Push Out Bond Strength of Three Types of Sealers
...Show More Authors

Background: The bond strength of the root canal sealers to dentin is very important property for maintaining the integrity and the seal of root canal filling. The aim of this study was to evaluate and compare the push-out bond strength of root filled with total fill Bioceramic, AH Plus and Gutta-flow®2 sealers using GuttaFusion®obturation system versus single cone obturation technique. Materials and method: sixty of mandibular premolars teeth with straight roots were used in this study, these roots were instrumented using Reciproc system, instrumentation were done with copious irrigation of 3 mL 5.25% sodium hypochlorite solution (NaOCl) during all the steps of preparation, and smear layer will be removed with 1 ml of 17% EDTA kept in

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Mon Apr 01 2024
Journal Name
South African Journal Of Chemical Engineering
Removal of COD from petroleum refinery wastewater by adsorption using activated carbon derived from avocado plant
...Show More Authors

View Publication
Scopus (11)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
CALCULATION BIASES FOR COEFFICIENTS AND SCALE PARAMETER FOR LINEAR (TYPE 1) EXTREME VALUE REGRESSION MODEL FOR LARGEST VALUES
...Show More Authors

Abstract

Characterized by the Ordinary Least Squares (OLS) on Maximum Likelihood for the greatest possible way that the exact moments are known , which means that it can be found, while the other method they are unknown, but approximations to their biases correct to 0(n-1) can be obtained by standard methods. In our research expressions for approximations to the biases of the ML estimators (the regression coefficients and scale parameter) for linear (type 1) Extreme Value Regression Model for Largest Values are presented by using the advanced approach depends on finding the first derivative, second and third.

View Publication Preview PDF
Crossref
Publication Date
Mon Dec 30 2024
Journal Name
Iraqi Journal Of Science
The Impact of Fear and Anti-Predator Behavior on the Dynamics of Stage-Structure Prey–Predator Model With a Harvesting
...Show More Authors

In this paper, an ecological model with stage-structure in prey population, fear, anti-predator and harvesting are suggested. Lotka-Volterra and Holling type II functional responses have been assumed to describe the feeding processes . The local and global stability of steady points of this model are established. Finally, the global dynamics are studied numerically to investigate the influence of the parameters on the solutions of the system, especially the effect of fear and anti-predation.

Scopus (1)
Scopus Crossref
Publication Date
Tue Oct 11 2022
Journal Name
College Of Islamic Sciences
The Jurisprudence rule and its impact on Islamic legislation “Forcing does not nullify the rights of others” as a model .
...Show More Authors

Research Summary :

         Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, his family and all his companions, then after:

     This is brief research that contained between its two covers one of the jurisprudence rules derived from Islamic Sharia that guarantees the right of others, in case of forcing to do the prohibited act, and it is a restriction of the rule: “Necessities allow prohibitions” and “Hardship brings facilitation” and support for the rule: “Necessities are valued.” It is an origin in alleviating the taxpayer definitely , and the study has briefly shown some of the jurisprudential appli

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Craniofacial Surgery
Evaluation of the Trephine Method in Harvesting Bone Graft From the Anterior Iliac Crest for Oral and Maxillofacial Reconstructive Surgery
...Show More Authors

View Publication
Scopus (15)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sat Feb 11 2023
Journal Name
Applied Sciences
A Preliminary Study and Implementing Algorithm Using Finite State Automaton for Remote Identification of Drones
...Show More Authors

Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the ene

... Show More
View Publication
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref