Preferred Language
Articles
/
ijcpe-273
Using Sonic Log to Predict Abnormal Pressure Zones in Selected Oil Wells (Western of Iraq)
...Show More Authors

Two oil wells were tested to find the abnormal pressure zones using sonic log technique. We found that well Abu-Jir-3 and Abu-Jir-5 had an abnormal pressure zones from depth 4340 to 4520 feet and 4200 to 4600 feet, respectively. The maximum difference between obtained results and the field measured results did not exceed 2.4%.
In this paper, the formation pressures were expressed in terms of pressure gradient which sometimes reached up to twice the normal pressure gradient.
Drilling and developing such formations were dangerous and expensive.
The plotted figures showed a clear derivation from the normal trend which confirmed the existence of abnormal pressure zones.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Organizational monitoring and reflex of suffacation of work . An opinions study of sample workers in manufacturing of Isphelt dohuk
...Show More Authors

The study aims to determine the organizational monitoring mechanism in target organization as well as knowing the suffocation of work. The study depends on a questionnaire as a tool of collecting data on distributed random sample involved (45) person from different   levels in manufacturing isphelt Dohuk. The study depends on some hypothesis, the most significant one is that there is not impact of organizational monitoring of suffocation especially on the target organization.

View Publication Preview PDF
Crossref
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Improving performance of the heads of academic departments at the University of Wasit in light of the administrative functions
...Show More Authors

            A field study aimed to improve  administrative performance of the Heads of Departments in Wasit University in light of the administrative functions, a questionnaire constructed was c of 38 items, as have been applied during the academic year 2014/2015 to a group of experts from the deans and assistants, professors and heads of departments using the Delphi method by two rounds the adoption rate of 90% and an agreement was numbered 30 experts and study reached important results have been analyzed and discussed according to fields of study, a planning, organization and direction.

View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Effect of maternal exposure of silver nanoparticles on the histogenesis of cerebellum in post-implantation of albino rats embryos
...Show More Authors

The central nervous system is the most important system and is very sensitive to any accidental infection during ontogenesis; it includes brain and spinal cord. The cerebellum is the second largest part of the brain after cerebrum and it’s very sensitive to the abnormal changes during the embryological development. This study was designed to investigate the effect of the maternal exposure of selected concentrations of suspension of nanoparticles on the ontogenesis of the rat cerebellum after embryos implanted in uterus. A total of 60 female pregnant rats were divided in to three groups, each contains 20 females. Group1 (G1) was treated orally with 2mg/kg /body weight (b. wt) of suspension of silver nanoparticles (Ag NPs). While group 2 (G

... Show More
Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Effects of Different Concentrations of Melatonin on the Time-course of Nitrite–induced Oxidation of Hemoglobin: In vitro Study
...Show More Authors

         Melatonin is a potent scavenger of reactive oxygen species or free radicals like superoxide and hydroxyl radicals. The oxidation of hemoglobin to methemoglobin (meth-Hb) by oxidizing compounds has been widely studied. The present work was designed to evaluate the ability of different concentrations of melatonin to inhibit nitrite–induced oxidation of hemoglobin. Blood samples were obtained from apparently healthy individuals from which erythrocyte hemolysate was prepared. Different concentrations of melatonin (10-9-1.0 mg/ml) were incubated for 10 min with the hemolysate, then to the resultant mixture 1 ml of sodium nitrite (final concentration 0.6 mM) was added, and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Effect of maternal exposure of silver nanoparticles on the histogenesis of cerebellum in post-implantation of albino rats embryos
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Oct 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The Sources and Effects of Risks of Forms of Islamic Financing in the Islamic Branches of the Commercial Bank
...Show More Authors

Proved Islamic banks in many countries where they are present, whether Muslim or non-Muslim in the wake of the global financial crisis, it is more efficient, profitable, and stable compared with the conventional banks, so went many of the worlds towards providing Islamic banking through Islamic windows to Besides financial services and products offered by the traditional, or the initiative to enter formulas Islamic finance is fully compliant with the principles and rules of Islamic law and is Brokerage basic function of conventional banks and Islamic alike ) and that means working on the mobilization of savings from surplus units and directed towards the financial units of the fiscal deficit) , which operates commercial banks

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jul 29 2023
Journal Name
International Journal Of Professional Studies
MULTIMODALITY IN THE COURTROOM IN AMERICAN AND BRITISH CRIMINAL CASES
...Show More Authors

PDBN Rashid, International Journal of Professional Studies, 2023

View Publication
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Knowledge Management in Saudi Universities Applied study in Shaqra University
...Show More Authors

  This research aims  to know the reality of  implementation of  Knowledge Management in Saudi Universities Applied  in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.

The study investigated the university staff  in Shaqra, Thadig, and Huraymila branches,  using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.

The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 14 2016
Journal Name
Al-academy
Figure role in highlighting and content in the technical poster
...Show More Authors

The poster is one of the means which can be communicate with others through it, to transfer ideas that the designer want to focus on, for its importance to accomplish the poster. It’s a visual mean contact aim to submit an idea to the audience to get a clear idea, and that would be through the shapes and subject to submit the idea. Depend on that our goal in this study is to find out, what follows:1-Finding the relationship between the shape and the idea.And the study comes up with several results, like:1-The drawings that contain themes connected with what the designer want to achieve, through the clearness of idea and to make those elements clear by putting more elements to surround the main shape.2-To assure that the strong connecti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref