Preferred Language
Articles
/
ijcpe-715
Petrophysical Properties of an Iraqi Carbonate Reservoir Using Well Log Evaluation
...Show More Authors

This research was aimed to determine the petrophysical properties (porosity, permeability and fluid saturation) of a reservoir. Petrophysical properties of the Shuiaba Formation at Y field are determined from the interpretation of open hole log data of six wells. Depending on these properties, it is possible to divide the Shuiaba Formation which has thickness of a proximately 180-195m, into three lithological units: A is upper unit (thickness about 8 to 15 m) involving of moderately dolomitized limestones; B is a middle unit (thickness about 52 to 56 m) which is composed of dolomitic limestone, and C is lower unit ( >110 m thick) which consists of shale-rich and dolomitic limestones. The results showed that the average formation water resistivity for the formation (Rw = 0.021), the average resistivity of the mud filtration (Rmf = 0.57), and the Archie parameters determined by the picket plot method, where m value equal to 1.94, n value equal to 2 and a value equal to 1. Porosity values and water saturation Sw were calculated along with the depth of the composition using IP V3.5 software. The interpretation of the computer process (CPI) showed that the better porous zone holds the highest amount of hydrocarbons in the second zone. From the flow zone indicator method, there are four rock types in the studied reservoir.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Digest Journal Of Nanomaterials And Biostructures
Preparation and study effect of vacuum annealing on structure and optical properties of AgCuInSe<inf>2</inf> thin film
...Show More Authors

Scopus (15)
Scopus Clarivate
Publication Date
Mon Oct 01 2012
Journal Name
Iraqi Journal Of Physics
Effect of carbon nanotube and Zn particles addition on the some mechanical properties and thermal conductivity of unsaturated polyester
...Show More Authors

In this research work a composite material was prepared contains a matrix which is unsaturated polyester resin (UPE) reinforced with carbon nanotube the percentage weight (0.1, 0.2, 0.4.0.5) %, and Zn particle the percentage weight (0.1, 0.2,0.4,0.5)%.
All sample were prepared by hand lay-up, process the mechanical tests contains hardness test, wear rate test, and the coefficient of thermal conductivity. The results showed a significant improvement in the properties of overlapping, Article containing carbon nano-tubes and maicroparticles of zinc because of its articles of this characteristics of high quality properties led to an, an increase in the coefficient of the rmalconductivity, and increase the hardness values with increased pe

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Alloys And Compounds
Probing the effects of thermal treatment on the electronic structure and mechanical properties of Ti-doped ITO thin films
...Show More Authors

View Publication
Scopus (19)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sun Nov 08 2015
Journal Name
مجلة كلية التربية الاساسية القاجسية
Synthesis, Characterization, and Antibacterial Properties of mixed ligand Complexes of (L-Leucine and 8-hydroxyquinoline) with some metals Ions
...Show More Authors

Publication Date
Wed Jan 01 2020
Journal Name
Plant Archives
The effect of adding some essential oils to the physicochemical properties of frozen beef sausage with different storage periods
...Show More Authors

Scopus (3)
Scopus
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of higher Education Institutes in restricting Administrative and Financial Corruption: An Analytic Reading
...Show More Authors

Corruption, in all its categories and forms, is regarded as the nowadays virus which has greatly spread in most institutes and society, a matter that cause a great waste of resources.

      According to the reports of international transparency Institute, Iraq is regarded as one of the greatest countries in corruption.

      Regardless of the reasons and forms of corruption, the retreat in work – values and ethics are the main reasons behind that.

      Being the main source of providing qualified staff "educators" for the working market, the high education institutes face great challenges in standing against corruption inside and outside

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 29 2024
Journal Name
Surgical Neurology International
Enhancing neuro-ophthalmic surgical education: The role of neuroanatomy and 3D digital technologies – An overview
...Show More Authors
Background:

Neuro-ophthalmology, bridging neurology and ophthalmology, highlights the nervous system’s crucial role in vision, encompassing afferent and efferent pathways. The evolution of this field has emphasized the importance of neuroanatomy for precise surgical interventions, presenting educational challenges in blending complex anatomical knowledge with surgical skills. This review examines the interplay between neuroanatomy and surgical practices in neuro-ophthalmology, aiming to identify educational gaps and suggest improvements.

Methods:

A literature search across databases such as PubMed, Scopus, and W

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effectiveness of Monetary Policy during the Financial Crisis in Malaysia: From an Administrative Perspective
...Show More Authors

Abstract:

                 In light of globalization and internationalization of financial markets, issues arising from financial crises have become increasingly serious and fundamental, creating a lot of debate among experts around the world. So, many studies have attempted to investigate what measures can be taken to detect and prevent crises before they devastate the economies.

             Therefore, this paper examines the Effectiveness of the Monetary Policy (MP) to Avoid, Reduce or Treat the Financial Crisis in Malaysia. Scholars have yet to agree on the issue

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Use Dividend Discount Model , DDM in Stocks Valuation With Framework of Inflation: An Applied Study
...Show More Authors

The theme of this Study presents analysis and discuss to the "Share the framework for assessing inflation," a practical study in a sample of joint stock companies listed on the Iraq Stock Exchange for the years (2009-2013). To determine the extent of the disparity between the nominal value of shares (Nominal Value) before deducting inflation and the real value (Real Value) per share, after deducting inflation in the case of zero growth. The study relied on annual reports of the companies of the research sample of the Iraq Stock Exchange, as well as the Iraqi Securities Commission. Besides the annual reports issued by the Ministry of Planning, as well as annual reports and statistical bulletin issued by the Central Bank of Iraq. It is fra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref