This study aims to evaluate reservoir characteristics of Hartha Formation in Majnoon oil field based on well logs data for three wells (Mj-1, Mj-3 and Mj-11). Log interpretation was carried out by using a full set of logs to calculate main petrophysical properties such as effective porosity and water saturation, as well as to find the volume of shale. The evaluation of the formation included computer processes interpretation (CPI) using Interactive Petrophysics (IP) software. Based on the results of CPI, Hartha Formation is divided into five reservoir units (A1, A2, A3, B1, B2), deposited in a ramp setting. Facies associations is added to well logs interpretation of Hartha Formation, and was inferred by a microfacies analysis of thin sections from core and cutting samples. The CPI shows that the A2 is the main oil- bearing unit, which is characterized by good reservoir properties, as indicated by high effective porosity, low water saturation, and low shale volume. Less important units include A1 and A3, because they have low petrophysical properties compared to the unit A2.
It is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.
The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th
... Show MoreA fault is an error that has effects on system behaviour. A software metric is a value that represents the degree to which software processes work properly and where faults are more probable to occur. In this research, we study the effects of removing redundancy and log transformation based on threshold values for identifying faults-prone classes of software. The study also contains a comparison of the metric values of an original dataset with those after removing redundancy and log transformation. E-learning and system dataset were taken as case studies. The fault ratio ranged from 1%-31% and 0%-10% for the original dataset and 1%-10% and 0%-4% after removing redundancy and log transformation, respectively. These results impacted direct
... Show MoreGraphene (Gr) decorated with silver nanoparticles (Ag NPs) were used to fabricate a wideband range photodetector. Silicon (Si) and porous silicon (PS) were used as a substrate to deposit Gr /Ag NPs by drop-casting technique. Silver nanoparticles (Ag NPs) were prepared using the chemical method. As well as the dispersion of silver NPs is achieved by a simple chemistry process on the surface of Gr.
The optical, structure and electrical characteristics of AgNPs and Gr decorated with Ag NPs were characterized by ultraviolet-visible spectroscopy (UV-Vis), x-ray diffraction (XRD). The X-ray diffraction (XRD) spectrum of Ag NPs exhibited 2θ values (38.1o, 44.3 o, 64.5 o and 77.7
... Show MoreRecently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con
... Show MoreHand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover
... Show MoreThe seismic reflection and gravity data were used to detect the tectonic boundaries in Kut-Hai-Fajir and surrounding areas, central Iraq. The depth maps of Dammam, Nhr Umr, and Sulaiy, formations were constructed and used to detect some boundareis in the study area. The residual gravity map and Total Horizantal derivative (THDR) also used to detected the tectonic boundaries. It is obtained that most boundaries or faults found in the deep formations; while some of them showen in the shallow fomations. The faults or boundaries obtained from gravity intrpretation mostly coincied with the deepest formation boundaries. Generally, the grvity anomalies conform the morphological feature locations within the depth maps of the formations. Many lon
... Show MoreMyelosuppression is one of the serious adverse effects of cancer chemotherapy that lead to life threatening febrile neutropenia and considered a limiting factor for successful therapy. Cyclophosphamide a widely used anticancer drugs, induces severe bone marrow suppression by damaging hematopoietic stem cells. As cancer incidence expands globally, the demand for an effective myeloprotective therapy during cancer treatment is also increasing.Nigella sativa seed oil, a well-known plant extract that widely used for various health conditions. This study aims to evaluate the myeloprotective activity of Nigella sativa seed oil in cyclophosphamide-induced myelosuppression mice model. Myelosuppression induced by single intraperitoneal injection o
... Show MoreBackground: The Streptococcus genus are the predominant bacteria in the mouth and the Streptococcus sanguinis is one of them which performing a primary function for expansion of dental biofilm. Gingival and periodontal disorders are caused by dental biofilm, today, there is a necessity to discover naturally presenting antibacterial compounds from herbs with less side effects as a substitutive to the commonly handled chlorohexidine. Thus, the purpose of this study was to assess the antibacterial activity of thymus vulgaris oil on Streptococcus sanguinis bacteria In vitro. Materials and Methods: Human supragingival plaque samples were taken from 10 subjects, then morphological and microscopical examination, bioch
... Show More