Preferred Language
Articles
/
ijcpe-897
A Review on Models for Evaluating Rock Petrophysical Properties
...Show More Authors

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated with the pore and fluid distribution. Throughout recent years, several studies have been conducted on rock properties, such as porosity, permeability, capillary pressure, hydrocarbon saturation, fluid properties, electrical resistivity, self-or natural-potential, and radioactivity of different types of rocks. These properties and their relationships are used to evaluate the presence or absence of commercial quantities of hydrocarbons in formations penetrated by, or lying near, the wellbore. A principal purpose of this paper is to review the history of development the most common techniques used to calculate petrophysics properties in the laboratory and field based primarily on the researchers and scientists own experience in this field.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of Engineering
The Effect of Circular Perforation on a V-Corrugated Fin Performance under Natural Convection
...Show More Authors

An experimental investigation has been made to study the influence of using v-corrugated aluminum fin on heat transfer coefficient and heat dissipation in a heat sink. The geometry of fin is changed to investigate their performance. 27 circular perforations with 1 cm diameter were made. The holes designed into two ways, inline arrangement and staggered in the corrugated edges arrangement. The experiments were done in enclosure space under natural convection. Three different voltages supplied to the heat sink to study their effects on the fins performance. All the studied cases are compared with v-corrugated smooth solid fin. Each experiment was repeated two times to reduce the error and the data recorded after reaching t

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
A Kinetic Study on Microwave- assisted Extraction of Bioactive Compounds from Rosmarinus Officinalis L
...Show More Authors

Due to the importance of the extraction process in many engineering and medical industries, in addition to great interest in medicinal plants, in this research, microwave-assisted extraction has been applied to extract some active compounds from Rosmarinus officinalis leaves.  The optimal extraction conditions were then determined by calculating the ratio and extraction efficiency. The process has also been described through kinetic study by applying five  kinetic models, the Hyperbolic diffusion model,  Power low model, the First order reaction  model, Elovich's model, and Fick's second law diffusion model and determining their compatibility with the studies operation, and determining the kinetic constants for each model. The result

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The impact of complexity management on dynamic capabilities: a survey at some private colleges
...Show More Authors

 

This research aims to understand complexity management and its impact on the use of the dynamic capabilities of a sample of private colleges.  Private colleges are currently facing many crises, changes, unrest and high competitive pressures.  Which is sometimes difficult or even impossible to predict.  The recruitment of dynamic capabilities is also one of the challenges facing senior management at private colleges to help them survive and survive.  Thus, the problem of research was (there is a clear insufficiency of interest in Complexity Management and trying to employ it in improving the dynamic capabilities of Colleges that have been discussed?). A group of private colleges was selected as a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
The Effect of Magnetic Field with Nanofluid on Heat Transfer in a Horizontal Pipe
...Show More Authors

This work presents an experimental study of heat transfer and flow of distilled water and metal oxide nanofluid Fe3O4-distilled water at concentrations of (φ = 0.3, 0.6, 0.9 %) by volume in a horizontal pipe with constant magnetic field. All the tests are carried out with Reynolds number range (2900-9820) and uniform heat flux (11262-19562 W/m2). The results show that, the nanofluid concentration and magnetic intensity increase, the Nusselt number increases. The maximum enhancement in Nusselt number with magnetic nanofluid is (5.4 %, 26.4 %, 42.7 %) for volume concentration (0.3, 0.6, 0.9 %) respectively. The enhancement is maximized with magnetic intensity (0.1, 0.2, 0.3 tesla) respectively to (43.9, 44

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
Impact of different sources of noise exposure on hearing impairment: A cross- sectional study
...Show More Authors

Background: Mental health is integrated into PHC as a strategy of WHO to fill the gap in mental health treatment. Part of this strategy needs a level of task shifting so that mental health care is provided by different level of PHC workers and not only specialists such as psychiatrists and psychologists.

Objectives: To assess the knowledge and attitudes of family doctors regarding the provision of psychological health in PHCC and if there is an association between the certificates of these family doctors and their Knowledge and attitudes to psychological health.

Subjects and Methods:  A cross-sectional descriptive study with analytic elements was conducted in 8 famil

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Iraqi Journal Of Physics
Photometry Technique to Map Elements’ Distribution on Comets’ Nuclei Surfaces Using a New Method
...Show More Authors

This study is unique in this field. It represents a mix of three branches of technology: photometry, spectroscopy, and image processing. The work treats the image by treating each pixel in the image based on its color, where the color means a specific wavelength on the RGB line; therefore, any image will have many wavelengths from all its pixels. The results of the study are specific and identify the elements on the nucleus’s surface of a comet, not only the details but also their mapping on the nucleus. The work considered 12 elements in two comets (Temple 1 and 67P/Churyumoy-Gerasimenko). The elements have strong emission lines in the visible range, which were recognized by our MATLAB program in the treatment of the image. The percen

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Apr 29 2022
Journal Name
Iraqi Journal Of Agricultural Sciences
EFFECT OF SUPPLEMENTARY IRRIGATION SYSTEM ON WHEAT PRODUCTION EFFICIENCY USING A STOCHASTIC FRONTIER ANALYSIS
...Show More Authors

This study was aimed to director wheat production's technical efficiency grown under two irrigation systems(fixed and pivot sprinkler irrigation systems)using random border analysis.Samples were collected randomly from267farmers from Salah Al-Din Governorate/Iraq.The samples were divided into two groups;187farmers used a pivot sprinkler irrigation system with three categories of possession(80,60and120dunums),while the other group used a fixed sprinkler irrigation system with four categories of possession(40,30,20and10dunums).Transcendent production function was used to study the effect of production factors on wheat yield. The results indicated that the mechanization work and the amount of added irrigation water increased by 1% whil

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
The classification of fetus gender based on fuzzy C-mean using a hybrid filter
...Show More Authors

This paper proposes a new approach, of Clustering Ultrasound images using the Hybrid Filter (CUHF) to determine the gender of the fetus in the early stages. The possible advantage of CUHF, a better result can be achieved when fuzzy c-mean FCM returns incorrect clusters. The proposed approach is conducted in two steps. Firstly, a preprocessing step to decrease the noise presented in ultrasound images by applying the filters: Local Binary Pattern (LBP), median, median and discrete wavelet (DWT),(median, DWT & LBP) and (median & Laplacian) ML. Secondly, implementing Fuzzy C-Mean (FCM) for clustering the resulted images from the first step. Amongst those filters, Median & Laplace has recorded a better accuracy. Our experimental evaluation on re

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref