Preferred Language
Articles
/
ijcpe-246
Formation Evaluation for Nasiriyah Oil Field Based on The Non-Conventional Techniques
...Show More Authors

The unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:

  • Apparent resistivity Rwa
  • Rxo /Rt

   The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A computer program had used to represent CPI results for the two mentioned methods, the results of interpretation indicate to hydrocarbon zones in.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 12 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Instructional Health Educational Vascular Access on Hemodialysis Patients' Knowledge at Al-Hussein Teaching Hospital in AL-Nasiriyah City.
...Show More Authors

Objectives: The study aims: (1) To determine effectiveness of instructional health education vascular access on hemodialysis patients' knowledge, (2) To find out the association between effects of instructional health education vascular access and demographic characteristics of (age, gender and educational level). Methodology: A quasi experimental study –control study design is carried out at AL-Hussein Teaching Hospital in AL-Nasiriyah City, from 3November,2015 to 2 June, 2016. A non-probability (Purposive sample) of (80) patients with vascular access devices on maintenance hemodialysis patients divided int

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Partial Encryption for Colored Images Based on Face Detection
...Show More Authors

Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Effectiveness of Monetary Policy in Neutralizing Oil Price Fluctuations on the Gross Domestic Product in Iraq for the Period (1990-2019)
...Show More Authors

The research aimed to measure the reality of monetary policy and its role in neutralizing the impact of fluctuations in total domestic oil prices, through the most important monetary policy variable (money supply). An example of this is using a simple technique in the previous example, turning it into a straightforward user interface by (Judd and Kunee). After estimating the impact of the policy with the domestic gross domestic oil prices in Iraq, the effect of fluctuations in the domestic gross domestic oil prices in the simple regression model, while the morale of oil prices was not proven with a negative sign, while the morale of money supply and their impact on the increase of the domestic was proven in the multiple regressio

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 25 2022
Journal Name
International Journal Of Drug Delivery Technology
Ultrasonic and Electrophysiological Evaluation of Carpal Tunnel Syndrome in Diabetic and Non-diabetic Subjects
...Show More Authors

Background: Carpal tunnel syndrome (CTS) is the most prevalent upper-limb entrapped neuropathy. A nerve conduction study (NCS) is the simplest method for identifying CTS when combined with a satisfactory clinical assessment and physical assessment. Ultrasound is a beneficial non-traumatic screening approach for CTS and there is a relationship between the NCS tests and the measures of CSA by ultrasound. Objective: to assess whether or not sonographic observations of the median nerve seems to be varied amongst DM and non-DM CTS individual. Patients and methods: The total of 50 non-DM Individuals with CTS and 50 DM individuals with CTS have been included in this study. All individuals were submitted to full medical assessment NCS testi

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
THE IMPACT OF OIL PRICES ON THE PUBLIC BUDGET AND TRADE BALANCE IN IRAQ FOR THE DURATION (2004-2017)
...Show More Authors

The fluctuations in oil prices in world markets affect the general budget and the trade balance of the rent countries, because oil is a strategic commodity affected by economic and political factors. The fluctuations in oil prices affect the public budgets of the rent countries through the public revenue side of oil revenues. On the other hand, these fluctuations affect the balance of trade through the volume of oil exports, which lead to imbalance of trade surplus or deficit .                                           &nbs

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Ingénierie Des Systèmes D Information
Performance Evaluation of a Multi Organizations Secure Internet of Vehicles Based on Hyperledger Fabric Blockchain Platform
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Indian Journal Of Ecology
Evaluation of maize hybrids, their inbred lines and estimation of genetic divergence based on cluster analysis
...Show More Authors

Scopus (4)
Scopus