Preferred Language
Articles
/
LRcmV5IBVTCNdQwCxKxV
Advanced Technique of Rock Typing Characterization of Mishrif Formation, Amara Oil Field in Southern Iraq
...Show More Authors

Reservoir rock typing integrates geological, petrophysical, seismic, and reservoir data to identify zones with similar storage and flow capacities. Therefore, three different methods to determine the type of reservoir rocks in the Mushrif Formation of the Amara oil field. The first method represents cluster analysis, a statistical method that classifies data points based on effective porosity, clay volume, and sonic transient time from well logs or core samples. The second method is the electrical rock type, which classifies reservoir rocks based on electrical resistivity. The permeability of rock types varies due to differences in pore geometry, mineral composition, and fluid saturation. Resistivity data are usually obtained from well logs, and resistivity logs are available. The third method is the storage capacity of rocks. The focus is on the ability of rocks to store liquids, especially hydrocarbons. This method analyzes porosity, permeability, and pore size distribution data. After that, we compared the previous three methods to identify the types of rocks and determine the best method. In the first method (Cluster Analysis), three types of rocks were identified (Bad, Moderate, and Good). In the second method, electrical rock type (ERT), four types of rocks were identified (Bad, Moderate, Good, and Very good). Then, the third method (Storage Capacity) came and enhanced the results of the second method, so the second method is considered the best and most accurate method determining the types of rocks.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 02 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Image encryption technique using Lagrange interpolation
...Show More Authors

Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Technique for Solving Autonomous Equations
...Show More Authors

This paper demonstrates a new technique based on a combined form of the new transform method with homotopy perturbation method to find the suitable accurate solution of autonomous Equations with initial condition.  This technique is called the transform homotopy perturbation method (THPM). It can be used to solve the problems without resorting to the frequency domain.The implementation of the suggested method demonstrates the usefulness in finding exact solution for linear and nonlinear problems. The practical results show the efficiency and reliability of technique and easier implemented than HPM in finding exact solutions.Finally, all algorithms in this paper implemented in MATLAB version 7.12.

 

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The role of strategic leadership in knowledge management processes "Diagnostic Study in the Office of the Ministry of Oil - Project Department"
...Show More Authors

The research deals with the important and modern two subjects, strategic leadership which have six demotions and knowledge management
(four demotions') . the gools & the research is to know the relation & the effect them in the oil ministry (project department) , the sample was (50) persons who works in the department the questionnaire was the tool of data gathering .

The research divided to four parties, the first  to the theotical review of the research variables, the second to the research methrology, the third to analysis and discoed the empirical results the last to the conclusions and recommendations .

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Journalism of Paper Newspapers in Light of the Competition of the Electronic Press / (A Field Study of Yemeni Daily Newspapers)
...Show More Authors

The researcher seeks to get scientific facts through knowing the relationship between the priorities of Yemeni audience in follow-up paper daily newspapers compared to surfing publics the online journalism sites and the nature of information obtained from online journalism sites and printed paper newspapers and the impact of the daily newspapers in the priority of issues and political events among a sample of a group of Yemeni readers in order to identify the extent to keep up the paper daily newspapers of the development in the field of online journalism and the extent of reading paper newspapers under the intense competition by online journalism sites, and are paper newspapers able to keep pace with the actual developments provided by

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 02 2014
Journal Name
International Journal Of Scientific & Technology Research
Synthesis, Structure And Characterization Of Zns Qds And Using It In Photocatalytic Reaction
...Show More Authors

ZnS nanoparticles were prepared by a simple microwave irradiation method under mild condition. The starting materials for the synthesis of ZnS quantum dots were zinc acetate (R & M Chemical) as zinc source, thioacetamide as a sulfur source and ethylene glycol as a solvent. All chemicals were analytical grade products and used without further purification. The quantum dots of ZnS with cubic structure were characterized by X-ray powder diffraction (XRD), the morphology of the film is seen by scanning electron microscopy (SEM). The particle size is determined by field effect scanning electron microscopy (FESEM), UV-Visible absorption spectroscopy and XRD. UV-Visible absorption spectroscopy analysis shows that the absorption peak of the as-prep

... Show More
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
synthesis and characterization
...Show More Authors

chloride or poluacrulic acid with different primary amines to mesuring==================================638one hundred three patinents with rheumatic symptoms were include in this study and their sera tested for

View Publication Preview PDF
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
A Study Of Corrosion Inhibition Of Low Carbon Steel In Washing Water Of Crude Oil Solution In The Presence Of Folic Acid
...Show More Authors

The corrosion behavior of low carbon steel in washing water of crude oil solution has been studied potentiostatically at five temperatures in the range (30–70)°C .The corrosion potential shifted to more negative values with increasing temperature and the corrosion current density increased with increasing temperature. Folic acid had on inhibiting effect on the corrosion of low carbon steel in washing water at a concentration (5× 10-4-- 5× 10-3 ) mol/dm3 over the temperature range (30–70)°C. Values of the protection efficiency were calculated from the corrosion current density .From the general results for this study, it can be seen that thermodynamic and kinetic function were also calculated (?G, ?S, ?H and Ea )

... Show More
View Publication Preview PDF
Crossref (3)
Crossref