Preferred Language
Articles
/
jcois-367
Some responses to ancient grammarians And contemporary researchers In monograms
...Show More Authors

Some responses to ancient grammarians
And contemporary researchers
In monograms

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Applying Penman-Monteith Equation to Evaluate the Performance of Atmometer Apparatus in Greenhouse for Estimating Reference Evapotranspiration
...Show More Authors

In this paper an atmometer apparatus were used in the greenhouses for estimating reference evapotranspiration values. Experimental work was conducted in the agriculture research center in the College of Agriculture-University of Baghdad west of the city of Baghdad. One atmometer was used in eggplant greenhouse and in cucumber greenhouse through the winter growing season 2013-2014. FAO Penman-Monteith equation was applied outside the greenhouse and used only 65% from the value of ETo in the greenhouses for estimating the reference evapotranspiration in the greenhouse. Moreover, Penman-Monteith equation was applied in greenhouses for the evaluating the performance of the atmometer. The results show that the erro

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Geological Journal
Development of 1D-Synthetic Geomechanical Well Logs for Applications Related to Reservoir Geomechanics in Buzurgan Oil Field
...Show More Authors

Knowledge of the distribution of the rock mechanical properties along the depth of the wells is an important task for many applications related to reservoir geomechanics. Such these applications are wellbore stability analysis, hydraulic fracturing, reservoir compaction and subsidence, sand production, and fault reactivation. A major challenge with determining the rock mechanical properties is that they are not directly measured at the wellbore. They can be only sampled at well location using rock testing. Furthermore, the core analysis provides discrete data measurements for specific depth as well as it is often available only for a few wells in a field of interest. This study presents a methodology to generate synthetic-geomechani

... Show More
Crossref (4)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Annals Of Tropical Medicine And Public Health
Salivary Protein Carbonyl Level in Relation to Gingival Health Status among a Group of Iraqi Pregnant Women
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Cfd Letters
Numerical Analysis for Solar Panel Subjected with an External Force to Overcome Adhesive Force in Desert Areas
...Show More Authors

View Publication
Scopus (21)
Crossref (21)
Scopus Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Using Artificial Neural Network to Predict Rate of Penetration from Dynamic Elastic Properties in Nasiriya Oil Field
...Show More Authors

   The time spent in drilling ahead is usually a significant portion of total well cost. Drilling is an expensive operation including the cost of equipment and material used during the penetration of rock plus crew efforts in order to finish the well without serious problems. Knowing the rate of penetration should help in speculation of the cost and lead to optimize drilling outgoings. Ten wells in the Nasiriya oil field have been selected based on the availability of the data. Dynamic elastic properties of Mishrif formation in the selected wells were determined by using Interactive Petrophysics (IP V3.5) software based on the las files and log record provided. The average rate of penetration and average dynamic elastic propert

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Instruction Program on Pregnant Women’s Knowledge regarding Anemia at Primary Health Care Centers in Baquba City
...Show More Authors

Objective: to identify the effect of the Instruction program on the knowledge of pregnant women who suffering anemia.

Methodology: A quasi-experimental design was carried out with the application of pre- post test for the study and the control group. Purposive sample, consists of (60) pregnant women diagnosed with anemia attending four health care centers in Baquba city.

Result: The findings indicate that the level of hemoglobin is increasing post instructional program among women in the study group, in which (46.7%) of women are reveal a level of (8.1-9) g/dl that is less than normal pre instructional program and the level is increased to normal level post instructional

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 29 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Food problem in Iraq: Challenges and Antiquities.: Food problem in Iraq: Challenges and Antiquities.
...Show More Authors

Research Hypothesis from the fact that kicks off the effect that agricultural production in Iraq plays an important role in overcoming the food problem and achieving food security, but he became far far away from the provision of sufficient quantities of food products and then securing the Iraqi consumer food basket by the challenges faced by the agricultural sector.
To prove the hypothesis research in its structure in three axes came, the first axis eating historical significance to the subject of food over time periods as well as to clarify the concept of food security, and the second axis touched on the most important challenges facing the agricultural sector in Iraq and prevent the achievement of food requirements for members of

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the external auditor in assessing the security of information technology systems in light of (ISO/IEC 27001): (Applied research on a sample of private banks)
...Show More Authors

This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Pressure Control of Electro-Hydraulic Servovalve and Transmission Line Effect
...Show More Authors

The effected of the long transmission line (TL) between the actuator and the hydraulic control valve sometimes essentials. The study is concerned with modeling the TL which carries the oil from the electro-hydraulic servovalve to the actuator. The pressure value inside the TL has been controlled by the electro-hydraulic servovalve as a voltage supplied to the servovalve amplifier. The flow rate through the TL has been simulated by using the lumped π element electrical analogy method for laminar flow. The control voltage supplied to servovalve can be achieved by the direct using of the voltage function generator or indirect C++ program connected to the DAP-view program built in the DAP-card data acqu

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (35)
Crossref (13)
Scopus Clarivate Crossref