Preferred Language
Articles
/
ijcpe-815
Digital Rock Samples Porosity Analysis by OTSU Thresholding Technique Using MATLAB
...Show More Authors

Porosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in resulting binary image. This paper presents the possibilities of using image processing for determining digital 2D rock samples porosity in carbonate reservoir rocks. MATLAB code created which automatically segment and determine the digital rock porosity, based on the OTSU's thresholding algorithm. In this work, twenty-two samples of 2D thin section petrographic image reservoir rocks of one Iraqi oil field are studied. The examples of thin section images are processed and digitized, utilizing MATLAB programming. In the present study, we have focused on determining of micro and macroporosity of the digital image. Also, some pore void characteristics, such as area and perimeter, were calculated. Digital 2D image analysis results are compared to laboratory core investigation results to determine the strength and restrictions of the digital image interpretation techniques. Thin microscopic image porosity determined using OTSU technique showed a moderate match with core porosity.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 01 2010
Journal Name
Iraqi Journal Of Physics
Preparation of Xerogel Films Doped with R6G Laser Dye using spin coating technique and Study the Spinning parameters Baha T.
...Show More Authors

Spin coating technique has been applied in this work to prepared Xerogel films doped with Rhodamine 6G laser dyes. The solid host of laser dye modifies its spectroscopic properties with respect to liquid host. During the spin coating process the dye molecules suffer from changing their environment. The effects of three parameters were studied here: the spinning speed, multilayer coating and formaldehyde addition

View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Heliyon
A comprehensive review on modelling the adsorption process for heavy metal removal from waste water using artificial neural network technique
...Show More Authors

View Publication Preview PDF
Scopus (44)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Wed Jan 10 2018
Journal Name
Al–bahith Al–a'alami
Using of digital media and its effect on constructing the value system of Iraqi society (Field study on a sample of the audience for the city of Baghdad model)
...Show More Authors

With the great development in the field of the Internet, the talk about the new media and its implications began, And its interactive services have made the future of media material sometimes participating in it and manufacturing it at other times,
the public is seeking information and choosing the appropriate ones, as well as exchanging messages with the sender after what the role of the receiver is just receiving information only.
This study aims to demonstrate the effects of using digital media in various forms and types to construct the value system of Iraqi society through the identification of the following aims:
Identify the most popular digital media for the Iraqi public in their daily lives on the Internet.
Identify

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Indian Journal Of Forensic Medicine And Toxicology
Study the genotoxicity of aqueous and alcoholic extracts of adhatoda vasica on the roots of allium cepa L. By RAPD-PCR technique
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sat Jun 10 2017
Journal Name
International Journal Of Current Microbiology And Applied Sciences
A Comparison between Tilapia zilli (Gervais, 1748) (Preciformes: Cichlidae) and Common Carp Cyprinus carpio (Linnaeus, 1758) (Cypriniformes: Cyprinidae) by Staining Bone Technique
...Show More Authors

View Publication
Crossref
Publication Date
Wed Oct 05 2022
Journal Name
Asian Journal Of Water, Environment And Pollution
Biosorption of Pollutants in Diyala River by Using Irrigated Vegetables
...Show More Authors

In the absence of environmental regulation, food stays to be contaminated with heavy metals, which is becoming a big worry for human health. The present research focusses on the environmental and health effects of irrigating a number of crops grown in the soils surrounding the Al-Rustamia old plant using treated wastewater generated by the plant. The physicochemical properties, alkalinity, and electrical conductivity of the samples were evaluated, and vegetable samples were tested for Cd, Pb, Ni, and Zn, levels, and even the transfer factor (TF) from soils to crops and crop and multi-targeted risk, daily intake (DIM) of metals, and health risk index (HRI) was calculated. The findings found that the average contents of Zn, Pb, Ni, and Cd in

... Show More
Publication Date
Thu Mar 01 2007
Journal Name
Al-khwarizmi Engineering Journal
The Inverse Solution Of Dexterous Robot By Using Neural Networks
...Show More Authors

The inverse kinematics of redundant manipulators has infinite solutions by using conventional methods, so that, this work presents applicability of intelligent tool (artificial neural network ANN) for finding one desired solution from these solutions. The inverse analysis and trajectory planning of a three link redundant planar robot have been studied in this work using a proposed dual neural networks model (DNNM), which shows a predictable time decreasing in the training session. The effect of the number of the training sets on the DNNM output and the number of NN layers have been studied. Several trajectories have been implemented using point to point trajectory planning algorithm with DNNM and the result shows good accuracy of the end

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
The Iraqi Journal Of Agricultural Science 48 (5), 1197-1205‏
Sex identification of date palm by using dna molecular markers
...Show More Authors

Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Producing CePowders By (LICVD)Process and Using TEA-Co2 Laser
...Show More Authors

In this research , Aprocess ( LICVD) was used for producing silicon nitride powders with chemical compositon Si3N4 ,by using TEA-Co2 Laser to induc reaction in the gas phase,  NH3 was used as on additive to SiH4. Reactant gases that were vibrationaly heated by absorbing energy emitted from TEA-Co2 Laser decomposes throug coillsion assisted multiple photon dissociation causing Si3N4 powders. By the dependence of the LICVD process  on  varios parameters such as Laser intensity , total gas pressure, partial pressures of SiH4 and NH3 were investigated. Dissociation rate as a function of Laser intensity and pressure was investigated. The powders obtained exhibit various colors from brown which  is rich in Si to white.This

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref