Preferred Language
Articles
/
ijcpe-260
Correlation of Penetration Rate with Drilling Parameters For an Iraqi Field Using Mud Logging Data
...Show More Authors

This paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 23 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Effect of pharmacist interventions on pulmonary function parameters of Iraqi asthmatic patients: A comparative study: Effect of pharmacist interventions on pulmonary functions tests
...Show More Authors

Background: Despite the fact that asthma is a long-term disease that may be treated, many people are unable to control their symptoms due to a lack of knowledge about their condition. The study's purpose was to find out if a pharmacist intervention improved asthma management because of this.

Objective: this study designed to assess the effect of pharmaceutical care on pulmonary functions test.

Method: The study was completed in three months. The patients who were enrolled were divided into two groups: Group 1 consists of 23 asthma patients who were randomly assigned to receive conventional therapy for chronic bronchial asthma based on disease stage and se

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Employing the references of Shariah Audit in supporting Governance of Iraqi Islamic Banks: An analytically study
...Show More Authors

The Islamic Banks including the Iraqi ones are often resorted to support their governance frameworks in order to improve its competitiveness in their communities. Where, those banks are looking for activities that enhance their governance; one of these activities is Shariah Audit that provided the auditing capabilities to face of developmental challenges and increase competitiveness. Therefore, the content of this paper, discusses know-how to use the Shariah Audit and its references in support of the Shariah Governance in the Iraqi Isla

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Sun Dec 02 2018
Journal Name
Journal Of The College Of Education For Women
The Role of Local Satellite Channels in the formation of knowledge and trends of the Iraqi Public Towards Terrorism: A Field Study
...Show More Authors

Terrorism is a global phenomenon that engulfs most regions of the world to varying degrees. Media outlets are aware of the many incidents of violence and terrorism that have increased in recent times. The differences between the size of the phenomenon in different societies are the causes and severity of the phenomenon. On the role of local satellite channels in shaping the knowledge and trends of the Iraqi public towards the events of terrorism, in light of the assumptions of reliance on the media. The importance of this study is that it assesses the role of local satellite channels in the formation of knowledge and trends The study seeks to know the extent of exposure of the Iraqi public to local satellite channels, and to reveal the e

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Al-mustansiriyah Journal Of Science
Study of Photons Emission Rate of Quark-Antiquark at Higher Energy
...Show More Authors

In this paper, the dynamic of quark and anti-quark interaction has been used to study the production of photons in the annihilation process based on the theory of chromodynamic. The rate of the photon is to be calculated for charm and anti-strange interaction c→γg system with critical temperature 113 and 130 MeV and photon energy GeV/c. Here the critical temperature, strength coupling and photons energy are assumed to be affected dramatically on the rate of photons emission of state interaction c, which can form gluon possible structures and photon emission state. The decreased photons emission yields with increased strength couple of quarks reaction due to increase critical temperature from 113 MeV to 130 MeV were predicted. We

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of The College Of Education For Women
Transportation movement with containers in Iraqi harbors
...Show More Authors

The use of containers in transportation leads to the reduction in time and effort of the process of loading and unloading of goods as well as protecting the goods from damage and breakage and to reduce the financial costs.
. This development has led also to make changes in the sizes and capacity of ships, therefore changes in the ports must be taken place where they must be provided with an appropriate depth for such vessels, that means the increase in the depth of ports and the establishment of wide storage yards and to provide appropriate mechanisms for handling process.
In this study, the researcher has dealt with this type of transport business in Iraqi ports, namely:
1- Khur Al-Zubair port.
2- Um Qaser port.
In order

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Construction of Nomograms Describing the Effect of Different Variables on the Behavior of a KCl/Polymer Drilling Fluid
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF