Preferred Language
Articles
/
2xYLGYcBVTCNdQwCFTaH
ESTIMATION OF SHEAR WAVE VELOCITY FROM WIRELINE LOGS DATA FOR AMARA OILFIELD, MISHRIF FORMATION, SOUTHERN IRAQ
...Show More Authors

Shear wave velocity is an important feature in the seismic exploration that could be utilized in reservoir development strategy and characterization. Its vital applications in petrophysics, seismic, and geomechanics to predict rock elastic and inelastic properties are essential elements of good stability and fracturing orientation, identification of matrix mineral and gas-bearing formations. However, the shear wave velocity that is usually obtained from core analysis which is an expensive and time-consuming process and dipole sonic imager tool is not commonly available in all wells. In this study, a statistical method is presented to predict shear wave velocity from wireline log data. The model concentrated to predict shear wave velocity from petrophysical parameters and any pair of compressional wave velocity, porosity and density in carbonate rocks. The established method can estimate shear wave velocity in carbonate rocks with a correlation coefficient of close to unity.

Crossref
View Publication
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Engineering
Unit Price and Cost Estimation Equations through Items Percentage of Construction Works in a Desert Area
...Show More Authors

This research will cover different aspects of estimating process of construction work in a desert area. The inherent difficulties which accompany the cost estimating of the construction works in desert environment in a developing country, will stem from the limited information available, resources scarcity, low level of skilled workers, the prevailing severe weather conditions and many others, which definitely don't provide a fair, reliable and accurate estimation. This study tries to present unit price to estimate the cost in preliminary phase of a project.  Estimations are supported by developing mathematical equations based on the historical data of maintenance, new construction of managerial and school projects.

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 30 2025
Journal Name
Babcock University Medical Journal
Microbial Diversity and Antibiotic Resistance Patterns in Burn and Wound Infections: A Study from the Al-Kindy Teaching Hospital, Iraq
...Show More Authors

Objective: Comprehending microbial diversity and antibiotic resistance patterns is essential for efficient treatment protocols. This study sought to determine the incidence of bacterial and fungal pathogens responsible for burn and wound infections and their antibiotic susceptibility profiles. Methods: This cross-sectional study involved 140 patients with burn or wound infections. Sterile swabs and pus aspiration were employed to collect samples, which were subsequently processed using standard microbiological procedures. Antibiotic resistance was determined using the Kirby-Bauer disc diffusion method, following Clinical and Laboratory Standards Institute (CLSI) guidelines. Data was analysed using IBM SPSS version 25.0, and the Chi-

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Sep 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Vapor-Liquid-Liquid Equilibrium (VLLE) Data for the Systems Ethyl acetate + Water, Toluene + Water and Toluene + Ethyl acetate + Water at 101.3 kPa. Using Modified Equilibrium Still
...Show More Authors

Isobaric Vapor-Liquid-Liquid equilibrium data for the binary systems ethyl acetate + water, toluene + water and the ternary system toluene + ethyl acetate + water were determined by a modified equilibrium still, the still consisted of a boiling and a condensation sections supplied with mixers that helped to correct the composition of the recycled condensed liquid and the boiling temperature readings in the condensation and boiling sections respectively. The VLLE data where predicted and correlated using the Peng-Robinson Equation of State in the vapor phase and one of the activity coefficient models Wilson, NRTL, UNIQUAC and the UNIFAC in the liquid phase and also were correlated using the Peng-Robinson Equation of State in both the vapo

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Water, Air And Soil Pollution
Cladophora Algae Modified with CuO Nanoparticles for Tetracycline Removal from Aqueous Solutions
...Show More Authors

Modified algae with nano copper oxide (CuO) were used as adsorption media to remove tetracycline (TEC) from aqueous solutions. Functional groups, morphology, structure, and percentages of surfactants before and after adsorption were characterised through Fourier-transform infrared (FTIR), X-ray diffraction (XRD), scanning electron microscopy (SEM), and energy-dispersive spectroscopy (EDS). Several variables, including pH, connection time, dosage, initial concentrations, and temperature, were controlled to obtain the optimum condition. Thermodynamic studies, adsorption isotherm, and kinetics models were examined to describe and recognise the type of interactions involved. Resultantly, the best operation conditions were at pH 7, contact time

... Show More
Scopus (29)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Water, Air, & Soil Pollution
Cladophora Algae Modified with CuO Nanoparticles for Tetracycline Removal from Aqueous Solutions
...Show More Authors

Modified algae with nano copper oxide (CuO) were used as adsorption media to remove tetracycline (TEC) from aqueous solutions. Functional groups, morphology, structure, and percentages of surfactants before and after adsorption were characterised through Fourier-transform infrared (FTIR), X-ray diffraction (XRD), scanning electron microscopy (SEM), and energy-dispersive spectroscopy (EDS). Several variables, including pH, connection time, dosage, initial concentrations, and temperature, were controlled to obtain the optimum condition. Thermodynamic studies, adsorption isotherm, and kinetics models were examined to describe and recognise the type of interactions involved. Resultantly, the best operation conditions were at pH 7, contact time

... Show More
Crossref (27)
Crossref
Publication Date
Tue Jun 19 2018
Journal Name
Elmofaker Review
Secondary liability for electronic auctions arising from the contribution to trademark infringement
...Show More Authors

Despite the global economic downturn, online e-commerce, especially the sale of counterfeit goods, continues to witness a rise in sales, and one of the important players in e-commerce is the owners of e-commerce auction sites. Although they do not have a direct role in trademark infringement, they still consider them indirectly responsible (secondary liability) for infringing on their trademarks. Thus, many cases have been filed by the owners of the original trademarks (which have been infringed by persons who have sold some of the goods and products that are imitating their marks through some electronic auctions) against the owners of those auctions. In view of the international character of the Internet, in different countries, and despit

... Show More
View Publication
Publication Date
Tue Mar 12 2019
Journal Name
Journal Of Global Pharma Technology,
Bentonite as an adsorption surface for bromothymol blue dye from aqueous solution
...Show More Authors

Scopus
Publication Date
Sat Jul 01 2017
Journal Name
Fuel
High purity FAU-type zeolite catalysts from shale rock for biodiesel production
...Show More Authors

View Publication
Scopus (68)
Crossref (69)
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2025
Journal Name
South African Journal Of Chemical Engineering
Electrocoagulation process for cobalt removal from industrial wastewater: Optimization and kinetic study
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More