Preferred Language
Articles
/
ijs-1241
Pre and Post-Stack Imaging of 2D Seismic Data Using Time Migration for Ajeel Oil field, Central of Iraq
...Show More Authors

Kirchhoff Time migration was applied in Pre and Post-Stack for 2D seismic survey for line AJ-99N, that is located in Ajeel oilfield in Salah Al-Din Governorate, Central Iraq. The process follows several accurate steps to reach the final time migration stage. The results of applied time migration give an accurate image for the Ajeel anticline reservoir and to improve the signal to noise ratio. Pre-Stack shows a clearer image for the structure in the study area, and the time-frequency analysis insure the result.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Product Innovation on an Improvement of the Organization's Reputation /A Field Study in State Organization for Marketing of Oil (SOMO)
...Show More Authors

 This paper aims to verify the existence of relationships between product innovation and the reputation of the organization. The study problem is that the State Organization for Marketing of Oil (SOMO) system is inflexible in terms of marketing procedures and needs innovative, unconventional methods in innovating its products and improving performance. The reputation of the organization. The importance of the study lies in that it is an attempt to raise the interest of SOMO in its approach to the research variables in order to enhance its competitive position in the future and improve the marketing business environment, which contributes to enhancing the reputation of the organization by product innovation. The study sample

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Increasing of Oil Field Productivity by Implementation of Re-entry Horizontal Injection Well, Case study
...Show More Authors

Water flooding is one of the most important methods used in enhanced production; it was a pioneer method in use, but the development of technology within the oil industry, takes this subject toward another form in the oil production and application in oil fields with all types of oils and oil reservoirs. Now days most of the injection wells directed from the vertical to re-entry of full horizontal wells in order to get full of horizontal wells advantages.
This paper describes the potential benefits for using of re-entry horizontal injection wells as well as combination of re –entry horizontal injection and production wells. Al Qurainat productive sector was selected for study, which is one of the four main productive sectors of Sout

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Crude Oil Analyses of the Yamama Formation in the Subbah, Ratawi, Tuba and Luhis Oil Fields, Southern Iraq
...Show More Authors

It is evident from this study that Yamama Formation is reservoir rocks and source rocks at the same time, based on occurrences of crude oil and source rocks. Bulk properties of Yamama oil in six wells as well as comparing several samples of Yamama oil by using the biological mark have indicated multi source of hydrocarbons with some pay having Jurassic and Lower Cretaceouse source affinity that belongs to the Yamama Formation.

View Publication Preview PDF
Publication Date
Tue Feb 19 2019
Journal Name
Heat And Mass Transfer
Mass transfer characteristics of a flow-by fixed bed electrochemical reactor composed of vertical stack stainless steel screens cathode
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Review of Challenges and Solutions for Genomic Data Privacy-Preserving
...Show More Authors

     The dramatic decrease in the cost of genome sequencing over the last two decades has led to an abundance of genomic data. This data has been used in research related to the discovery of genetic diseases and the production of medicines. At the same time, the huge space for storing the genome (2–3 GB) has led to it being considered one of the most important sources of big data, which has prompted research centers concerned with genetic research to take advantage of the cloud and its services in storing and managing this data. The cloud is a shared storage environment, which makes data stored in it vulnerable to unwanted tampering or disclosure. This leads to serious concerns about securing such data from tampering and unauthoriz

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jun 14 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Myxobolus Infections of the Cyprinid Fishes from Lesser Zab and Greater Zab Rivers, North of Iraq with the Record of Seven Species of Myxobolus for the First Time in Iraq
...Show More Authors

 A total of 1453 freshwater fishes, belonging to 14 species of the
family Cyprinidae was collected from Lesser Zab and Greater Zab
rivers in north of Iraq during the period from November 2000 to the
end of November 2001. The inspection of skin, gills and different
internal organs revealed the infection of these fishes with a total of 14
species of Myxobolus which included seven species that represented
their first record in Iraq. These species included M. bulbocordis from
both Barbus sharpeyi and Chondrostoma regium; M. karuni from B
grypus; M. mesopotamiae from B. luteus; M. molnári from B
esocinus; M. pcrsicus from both B. grypus and Cyprinion macrostomum;
M.  Shaagani from both B. b

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 23 2016
Journal Name
Computer Science & Information Technology ( Cs & It )
Modelling Dynamic Patterns Using Mobile Data
...Show More Authors

View Publication
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
Image Retrieval Using Data Mining Technique
...Show More Authors

Even though image retrieval is considered as one of the most important research areas in the last two decades, there is still room for improvement since it is still not satisfying for many users. Two of the major problems which need to be improved are the accuracy and the speed of the image retrieval system, in order to achieve user satisfaction and also to make the image retrieval system suitable for all platforms. In this work, the proposed retrieval system uses features with spatial information to analyze the visual content of the image. Then, the feature extraction process is followed by applying the fuzzy c-means (FCM) clustering algorithm to reduce the search space and speed up the retrieval process. The experimental results show t

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lossless Data Hiding Using L·SB Method
...Show More Authors

A loS.sless (reversible) data hiding (embedding) method  inside  an image  (translating medium)  - presented   in  the  present  work  using  L_SB (least  significant  bit). technique  which  enables  us to translate   data  using an  image  (host  image),  using  a  secret  key, to  be  undetectable  without losing  any  data  or  without   changing   the  size  and  the  external   scene (visible  properties) of the image, the hid-ing data is then can  be extracted (without  losing)   by reversing &n

... Show More
View Publication Preview PDF