Preferred Language
Articles
/
bBfc65IBVTCNdQwCmsNf
Artificial Neural Network Application to Permeability Prediction from Nuclear Magnetic Resonance Log
...Show More Authors

Reservoir permeability plays a crucial role in characterizing reservoirs and predicting the present and future production of hydrocarbon reservoirs. Data logging is a good tool for assessing the entire oil well section's continuous permeability curve. Nuclear magnetic resonance logging measurements are minimally influenced by lithology and offer significant benefits in interpreting permeability. The Schlumberger-Doll-Research model utilizes nuclear magnetic resonance logging, which accurately estimates permeability values. The approach of this investigation is to apply artificial neural networks and core data to predict permeability in wells without a nuclear magnetic resonance log. The Schlumberger-Doll-Research permeability is used to train the model, where the model prediction result is validated with core permeability. Seven oil well logs were used as input parameters, and the model was constructed with Techlog software. The predicted permeability with the model compared with Schlumberger-Doll-Research permeability as a cross plot, which results in the correlation coefficient of 94%, while the predicted permeability validated with the core permeability of the well, which obtains good agreement where R2 equals 80%. The model was utilized to forecast permeability in a well that did not have a nuclear magnetic resonance log, and the predicted permeability was cross-plotted against core permeability as a validation step, with a correlation coefficient of 77%. As a result, the low percentage of matching was due to data limitations, which demonstrated that as the amount of data used to train the model increased, so did the precision.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Systematic Reviews In Pharmacy
Recent Development In Oxine Complexes And Their Medical Application: A Review.
...Show More Authors

This review is concluded of 8-Hydroxyquinline (8HQ) compound and derivatives which has a very significant interests with a strong fluorescence , furthermore the relationship between divalent metal ions and characteristic of chelating . In the same way coordinated features have increase of its organic action and inorganic behavior by giving many samples of compounds which are a good chelating agents ligands with more capable of forming very stable complexes.Therefore, the role of (8HQ) is not limited on complexes only but its applications in different fields so this review will focus on demonstration preparation methods and properties of (8HQ) derivatives with their complexes and applications, hopefully that we will cover a part of scientifi

... Show More
View Publication
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Statistical testing mediation in structural equations models variables with practical application
...Show More Authors

Abstract:
       This study is studied one method of estimation and testing parameters mediating variables in a structural equations model SEM is causal steps method, in order to identify and know the variables that have indirect effects by estimating and testing mediation variables parameters by the above way and then applied to Iraq Women Integrated Social and Health Survey (I-WISH) for year 2011 from the Ministry of planning - Central statistical organization to identify if the  variables having the effect of mediation in the model by the step causal methods by using AMOS program V.23, it
was the independent variable X represents a phenomenon studied (cultural case of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Statistical testing mediation in structural equations models variables with practical application
...Show More Authors

In this research was the study of a single method of estimation and testing parameters mediating variables (Mediation) in a specimen structural equations SEM a bootstrap method, for the purpose of application of the integrated survey of the situation Marital data and health mirror Iraqi (I-WISH) for the year 2011 from the Ministry of Planning - device Central Bureau of Statistics, and applied to the appropriate data from the terms of the data to a form of structural equation SEM using factor analysis affirmative (Confirmatory Factor analysis) CFA As a way to see the match variables that make up the model, and after confirming the model matching or suitability are having the effect of variables mediation in the model tested by the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 15 2016
Journal Name
Hepatology
Carboxylesterase 2 prevents liver steatosis by modulating lipolysis, endoplasmic reticulum stress, and lipogenesis and is regulated by hepatocyte nuclear factor 4 alpha in mice
...Show More Authors

Nonalcoholic fatty liver disease (NAFLD) is a common liver disease that ranges from simple steatosis to nonalcoholic steatohepatitis (NASH). So far, the underlying mechanism remains poorly understood. Here, we show that hepatic carboxylesterase 2 (CES2) is markedly reduced in NASH patients, diabetic db/db mice, and high‐fat diet (HFD)‐fed mice. Restoration of hepatic CES2 expression in db/db or HFD‐fed mice markedly ameliorates liver steatosis and insulin resistance. In contrast, knockdown of hepatic CES2 causes liver steatosis and damage in chow‐ or Western diet‐fe

... Show More
View Publication
Scopus (124)
Crossref (124)
Scopus Clarivate Crossref
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Conference Of Numerical Analysis And Applied Mathematics Icnaam 2019
Functionalized multi-walled carbon nanotubes network sensor for NO2 gas detection at room temperature
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Implementation of Transmitter Zigbee System based on Wireless Sensor Network of IEEE 802.15.4 Standard
...Show More Authors

Abstract

 

Zigbee is considered to be one of the wireless sensor networks (WSNs) designed for short-range communications applications. It follows IEEE 802.15.4 specifications that aim to design networks with lowest cost and power consuming in addition to the minimum possible data rate. In this paper, a transmitter Zigbee system is designed based on PHY layer specifications of this standard. The modulation technique applied in this design is the offset quadrature phase shift keying (OQPSK) with half sine pulse-shaping for achieving a minimum possible amount of phase transitions. In addition, the applied spreading technique is direct sequence spread spectrum (DSSS) technique, which has

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Network Self-Fault Management Based on Multi-Intelligent Agents and Windows Management Instrumentation (WMI)
...Show More Authors

This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Role of System Strategic Learning Smart In Sustainability Success of Managing Network e-Business
...Show More Authors

Purpose: Determining and identifying the relationships of smart strategic education systems and their potential effects on sustainable success in managing clouding electronic business networks according to green, economic and environmental logic based on vigilance and awareness of the strategic mind.

Design: Designing a hypothetical model that reveals the role and investigating audit and cloud electronic governance according to a philosophy that highlights smart strategic learning processes, identifying its assumptions in cloud spaces, choosing its tools, what it costs to devise expert minds, and strategic intelligence.

Methodology:

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref