Preferred Language
Articles
/
NhYeGocBVTCNdQwC3jdT
Formulating Inhibited Fluids for Stable Drilling Operations into Tanuma and Zubair Shales, Zubair Oilfield, Southern Iraq
...Show More Authors

Tanuma and Zubair formations are known as the most problematic intervals in Zubair Oilfield, and they cause wellbore instability due to possible shale-fluid interaction. It causes a vast loss of time dealing with various downhole problems (e.g., stuck pipe) which leads to an increase in overall well cost for the consequences (e.g., fishing and sidetrack). This paper aims to test shale samples with various laboratory tests for shale evaluation and drilling muds development. Shale's physical properties are described by using a stereomicroscope and the structures are observed with Scanning Electron Microscope. The shale reactivity and behavior are analyzed by using the cation exchange capacity testing and the capillary suction test is utilized for selecting shale inhibitor base. As a result, four drillings muds are formulated with different additives and approved by using the Linear Swelling Meter and the Hot Rolling experiments. Tanuma’s shale is at higher reactivity level, where it is moderate to high active shale than Zubair’s shale, which is at a low to moderately reactive formation. Microfractures and micropores are excited in both formations and potentially in Tanuma’s shale. The shale stability can be achieved by adding 8 % of KCl for Tanuma’s mud and 4% of KCl for Zubair’s mud. The filtration controls are contributed to seal the shale open structures and adding the Poly amino acid hydration suppressant reduced the risk of shale swelling significantly. The results can be used for designing drilling mud to reduce shale instability issues and the cost.

Scopus Crossref
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
Al-qadisiyah Journal Of Pure Science
Weakly and Strongly Forms of Fibrewise Fuzzy ω-Topological Spaces
...Show More Authors

This paper is devoted to introduce weak and strong forms of fibrewise fuzzy ω-topological spaces, namely the fibrewise fuzzy -ω-topological spaces, weakly fibrewise fuzzy -ω-topological spaces and strongly fibrewise fuzzy -ω- topological spaces. Also, Several characterizations and properties of this class are also given as well. Finally, we focused on studying the relationship between weakly fibrewise fuzzy -ω-topological spaces and strongly fibrewise fuzzy -ω-topological spaces.

View Publication Preview PDF
Publication Date
Sat Jul 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
Post Cesarean Section Surgical Site Infection; Incidence and Risk Factors
...Show More Authors

The rate of births delivered by cesarean section (CS) has gone up substantially all over the world. Post-cesarean surgical site infection (SSI) is a common cause of maternal morbidity and mortality that results in prolonged period of hospitalization with increased cost and direct health implications, especially in low socioeconomic population, resource- restricted settings, and war- related conditions with internal forced movement. This study was aimed to find incidence of post cesarean section surgical site infection withthe accompanying risk factors.Pregnant ladies admitted to department of obstetrics and gynecology at Medical City Hospital in Baghdad who had undergone CSs were followed up prospectively from first of January 2017 till end

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 16 2022
Journal Name
Methods In Molecular Biology
Fluorescent Proteins: Crystallization, Structural Determination, and Nonnatural Amino Acid Incorporation
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu May 05 2022
Journal Name
5g Impact On Biomedical Engineering
Wireless Techniques and Applications of the Internet of Medical Things
...Show More Authors

View Publication
Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Performance evaluation of heterogeneous network based on RED and WRED
...Show More Authors

Scopus (3)
Scopus
Publication Date
Thu Mar 30 2023
Journal Name
مجلة الحقيقة
University e-learning and its role in raising technological skills
...Show More Authors

تتبلور فكرة البحث حول التوصل لنوع العلاقة التي تربط التعليم الالكتروني خلال جائحة كورونا برفع المهارات التكنولوجية للأساتذة والطلاب، وتبرز أهمية البحث في ان نجاح الوصول لهذه العلاقة يمكن الإفادة منها في تغيير منهجية تطوير المهارات التكنولوجية مستقبلا وذلك باعتماد الجوانب التطبيقية الفعلية بدلا من الدورات وورش العمل والتي قد لا تضاهي الطريقة العملية في رفع مستوى المهارات المختلفة سواء التدريسية او التكنو

... Show More
View Publication Preview PDF
Publication Date
Sun May 17 2020
Journal Name
Biochemical And Cellular Archives
COMPARISON OF PERI-IMPLANT MICROBIOTA BETWEEN HEALTHY AND DISEASED IMPLANTS
...Show More Authors

Recently, dental implants have experienced increasing demand as one of the most effective, permanent and stable ways for replacing missing teeth. However, peri-implant diseases that are multispecies plaque-based infections may ultimately lead to implant failure (i.e., late peri-implantitis). Therefore, the present study aims to detect the microbial diversity of subgingival plaque in peri-implantitis cases (N = 30) by comparing with healthy implants (N = 34) using culture-based identification methods, including VITEK 2 system. An increase in microbial diversity (29 species along with 1 and 7 isolates, which were classified as a genus and unidentified species, respectively) were observed in subgingival sites of diseased implants dominated by

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 08 2023
Journal Name
Journal Of Planner And Development
Lebanese building law between texts, Application gaps and land scarcity
...Show More Authors

This paper examines the gaps in Lebanese building law as well as the exploitation of contractors, stakeholders, and residents in order to make illegal profits at the expense of The Shape of urban agglomerations and their expansion in cities and rural areas, which is contrary to the principles of sustainable land development. It also emphasizes the amplification of the factors of vertical and horizontal building investments in the implementation of buildings contrary to the license, as well as the burden that this places on the city's resulting infrastructure and ability to absorb the activities and needs of its residents. The study then presents recommendations in the process of transformation in the technique of planning and application

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
College Of Islamic Sciences
Two Poets Alandaluian Abu Al Makshi and His Douter Hasana
...Show More Authors

Andalusian literature is a literature in itself that is influenced and influenced, and it did not come out of thin air. Muslim Arabs came from the East to this country for jihad and a desire to live, and they carried with them their beliefs, customs and traditions. They must blend in the new element and its environment, so interference, fusion, diversity and influence actually took place.
It seems to us that the Arabs in the era of the governors in Andalusia (92-138 AH) strived hard to preserve everything that is Eastern. Literature is an oriental model in the content of prose and poetry, but in the era of the Umayyad emirate, we will notice that the environment, the development of ages, and the mixing of civilizations have an effect

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref