Preferred Language
Articles
/
xhjiN5QBVTCNdQwCrANM
Types and functions of comparisons (based on Russian and Arabic phraseological units) Типы и функции сравнений (на материале русских и арабских фразеологизмов) انواع ووظائف المقارنات )في االمثال الروسية والعربية
...Show More Authors

Comparison is the most common and effective technique for human thinking: the human mind always judges something new based on its comparison with similar things that are already known. Therefore, literary comparisons are always clear and convincing. In our daily lives, we are constantly forced to compare different things in terms of quantity, quality, or other aspects. It is known that comparisons are used in literature in order for speech to be clear and effective, but when these comparisons are used in everyday speech, it is in order to convey the meaning directly and quickly, because many of these expressions used daily are comparisons. In our research, we discussed this comparison as a means of metaphor and expression in Russian and Arabic. We have explained in detail the types of comparisons (metaphorical and objective), their structure and main functions. We also analyzed the comparative constructions of Russian and Arabic linguistic units.

Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Permeability Prediction in One of Iraqi Carbonate Reservoir Using Statistical, Hydraulic Flow Units, and ANN Methods
...Show More Authors

   Permeability is an essential parameter in reservoir characterization because it is determined hydrocarbon flow patterns and volume, for this reason, the need for accurate and inexpensive methods for predicting permeability is important. Predictive models of permeability become more attractive as a result.

   A Mishrif reservoir in Iraq's southeast has been chosen, and the study is based on data from four wells that penetrate the Mishrif formation. This study discusses some methods for predicting permeability. The conventional method of developing a link between permeability and porosity is one of the strategies. The second technique uses flow units and a flow zone indicator (FZI) to predict the permeability of a rock mass u

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jul 22 2019
Journal Name
Journal Of Petroleum Exploration And Production Technology
Flow units and rock type for reservoir characterization in carbonate reservoir: case study, south of Iraq
...Show More Authors
Abstract<p>The current work is focused on the rock typing and flow unit classification for reservoir characterization in carbonate reservoir, a Yamama Reservoir in south of Iraq (Ratawi Field) has been selected, and the study is depending on the logs and cores data from five wells which penetrate Yamama formation. Yamama Reservoir was divided into twenty flow units and rock types, depending on the Microfacies and Electrofacies Character, the well logs pattern, Porosity–Water saturation relationship, flow zone indicator (FZI) method, capillary pressure analysis, and Porosity–Permeability relationship (R35) and cluster analysis method. Four rock types and groups have been identified in the Yamama formation de</p> ... Show More
View Publication
Scopus (41)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
of the Government finance Statistics GFS System In StrengtheningThe Role Oversight on performance Centrally Funded Units
...Show More Authors

This study aims to highlight the role of financial control in the development of government performance through the use of "GFS" system and its application in the service of government units, which will help them in how to use financial resources efficiently through the quality of accounting information provided by this system in the financial statements that reflect the predictability in that fiscal policy of the state through government programs and activities fee as well as to identify weaknesses and address them quickly in order to avoid wastage and loss of public money, which leads to the possibility of utilization of available financial resources of the state to effectively and efficiently, has been reached that the failure of gove

... Show More
View Publication
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Inspector General
Civil Liability of SWAT Units in US Law
...Show More Authors

It is necessary for police agencies both in the United States and elsewhere in the world to have rapid intervention units that carry out special tasks that regular police cannot handle, such as carrying out search warrants and arresting dangerous criminals, Armed robbery, release of hostages, terrorist incidents, mentally disturbed persons, and other special missions. They are supposed to be well trained, highly self-confident; working together, self-disciplined, and use the force to deal with the special situations they may face. Either there have been many cases in the United States of America against members of these units, personally or against the agencies, they work in because of excessive use of force in many cases that have been use

... Show More
View Publication
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Governance Mechanisms on the Accounting Disclosure of the Sustainable Development of Iraqi Economic Units
...Show More Authors

The research aims to demonstrate the impact of governance mechanisms on the quality of financial reports in the light of the accounting disclosure for sustainable development represented in (accounting disclosure for economic development, accounting disclosure for environmental development, and accounting disclosure for social development) in a sample of banks listed in the Iraq Stock Exchange.

Governance mechanisms were measured by evaluating and analyzing the mechanisms in banks for the research sample consisting of (15) banks, based on the governance guide issued by the Central Bank, as well as the banks’ financial reports for the years 2016 -2018, and the dimensions of accounting disclosure for sust

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (44)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (19)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref