Preferred Language
Articles
/
ijcpe-946
Estimation Pore and Fracture Pressure Based on Log Data; Case Study: Mishrif Formation/Buzurgan Oilfield at Iraq
...Show More Authors

Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pressure gradient and clay volume, which were also established first, data such as gamma ray, density, resistivity, and sonic log data are also required. A key consideration in the design of certain wells is the forecasting of fracture pressure for wells drilled in the southern Iraqi oilfield of Buzurgan. The pressure abnormality is found in MA, MB21, MC1 and MC2 units by depending on pore pressures calculated from resistivity log. In these units, depths and its equivalent normal and abnormal pressure are detected for all sex selected wells; BUCS-47, BUCS-48, BUCS-49, BUCN-43, BUCN-51 and BBCN-52. For MA, MB21, MC1, and MC2 units, the highest difference in pore pressure values are 1698 psi @ 3750 m (BUCN-51), 3420 psi @ 3900 m (BUCN-51), 788 psi @ 3980 m (BUCS-49), and 5705 psi @ 4020 m (BUCN-52). On other hands, MB11 and MB12 units have normal pressure trend in all studied wells. Finally, the results show that the highest pore and fracture pressure values is existed in North dome, in comparison with that obtained in south dome of Mishrif reservoir at Buzurgan oilfield.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 03 2022
Journal Name
Teikyo Medical Journal
Tooth agenesis and palatal dimensions associated with craniofacial deformity- Cone Beam Computed Tomography based study
...Show More Authors

Cleft / palate is one of the common congenital deformities in craniofacial region, associated with different types of dental anomalies like (Tooth agenesis, impaction, and supernumerary teeth) with marked changes in palatal dimensions. This study aimed to determine the prevalence of teeth agenesis and dental anomalies in cleft lip/palate patients using CBCT, and to compare the palatal dimension of cleft group with control subjects. Twenty-eight cleft cases collected during the period from 2015 to 2022, CBCT images evaluated, the study sample classified into two groups (14 bilateral and 14 unilateral cleft lip/palate) and the non-cleft control group (14 CBCT images). The presence of dental anomalies was assessed in relation to clef

... Show More
Publication Date
Fri Dec 30 2022
Journal Name
Journal Of The College Of Education For Women
Constructing Imminent Carcinogenic Attack in English and Arabic Scientific Discourse: A Corpus-Based Contrastive Study
...Show More Authors

Cancer is one of the critical health concerns. Health authorities around the world have devoted great attention to cancer and cancer causing factors to achieve control against the increasing rate of cancer. Carcinogens are the most salient factors that are accused of causing a considerable rate of cancer cases. Scientists, in different fields of knowledge, keep warning people of the imminent attack of carcinogens which are surrounding people in the environment and may launch their attack at any moment. The present paper aims to investigate the linguistic construction of the imminent carcinogen attack in English and Arabic scientific discourse. Such an investigation contributes to enhancing the scientists’ awareness of the linguistic co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Craniomaxillofacial Trauma & Reconstruction
Mandibular Fractures in Iraq: An Epidemiological Study
...Show More Authors

The purpose of this study was to evaluate the epidemiological characteristics of the mandibular fractures relating to gender, age, the etiology of injury, and the rendered treatment modalities and complications. The data of the patients who sustained mandibular fractures were retrieved and were analyzed retrospectively, and based on these data a descriptive analysis was conducted. A total of 112 patients were included in this study; the most common cause was road traffic accidents (RTAs) followed by assaults and missile injuries. The most frequently involved age group was 11 to 20 years, treatment modalities included conservative, closed reduction and indirect fixation, and open reduction and internal fixation (ORIF) in 11.6, 79.5, and 8.9%

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Agricultural Sciences
PALYNOLOGICAL STUDY OF GENUS Pterocephalus IN IRAQ
...Show More Authors

This research was aimed to study the pollen morphology for the genus Pterocephalus(Vaill)  from Dipsacaceae family in Iraq, and to utilize these feathers in isolating the species as valuable taxonomic traits for enriching Iraqi flora. The study included characteristics of the type, shape, size, sculpturing and apertures, as well as determining the full dimensions using light microscopy as well as numerical analysis of this species and draw polygonal shapes and denderogram  convergence between species. The results of the study of pollen and polygonal forms showed significant differences in the characteristics at the level of each species, which helps to identification the genus species, as it was found that the pollen was a tricolp

... Show More
Publication Date
Mon Dec 07 2020
Journal Name
Iranian Journal Of Parasitology
Serum levels of il-12 and il-23 in breast cancer patients infected with toxoplasma gondii: A case-control study
...Show More Authors

Scopus (2)
Scopus
Publication Date
Wed May 10 2023
Journal Name
Journal Of Planner And Development
the Planning and Management of Services in Rural Areas, AL-Gharraf sub-district in Dhi Qar Governorate, a case study.
...Show More Authors

         Bringing about urban, economic, and social changes in rural areas similar to those occurring in urban areas aims to reduce urban-rural disparities by providing services in those areas, decentralizing the management of these services, expanding citizen participation in local governance (decentralized administration), and achieving comprehensive development, developing and empowering localities, and keeping pace with new transformations and their impacts on the functions of the center and localities. In fact, the lack of clarity of the role of local government in planning and managing services has hindered development plans, and declined the level of services in rural areas, and has negative

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 05 2017
Journal Name
Https://www.researchgate.net/journal/international-journal-of-science-and-research-ijsr-2319-7064
Evaluation of Water Quality using Bhargava Water Quality Index Method and GIS, Case Study: Euphrates River in Al-Najaf City
...Show More Authors

ENGLISH

Crossref (3)
Crossref
Publication Date
Thu Nov 16 2017
Journal Name
Joiv : International Journal On Informatics Visualization
Multilayered Framework to Enhance Management Information Systems Decision on Sensitive Data in Cloud Computing Environment
...Show More Authors

The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE IMPACT OF ETHICAL LEADERSHIP BEHAVIOR IN UNIVERSITY PERFORMANCE- STUDY EXPLORATORY AT SUMER UNIVERSITY: THE IMPACT OF ETHICAL LEADERSHIP BEHAVIOR IN UNIVERSITY PERFORMANCE- STUDY EXPLORATORY AT SUMER UNIVERSITY
...Show More Authors

The aim of the study was to find out the correlations and impact between the variable of ethical leadership behavior and university performance at Sumer University. Use the descriptive analytical method by adopting the questionnaire tool to collect data. The questionnaire was distributed electronically to 113 teachers at Sumer University and the response was from 105 teachers. The research results showed that there is a correlation and effect relationship between the search variables. In addition, the responding university does not have ethically defined standards in terms of performance of the work of the cadres working there. Finally, the research presented a set of recommendations aimed at tackling problems in the ethical lead

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More