Preferred Language
Articles
/
ijs-1539
Hartha Formation divisions Based on Well Logs Analysis in Majnoon Oil Field, Southern Iraq
...Show More Authors

This study aims to evaluate reservoir characteristics of Hartha Formation in Majnoon oil field based on well logs data for three wells (Mj-1, Mj-3 and Mj-11). Log interpretation was carried out by using a full set of logs to calculate main petrophysical properties such as effective porosity and water saturation, as well as to find the volume of shale. The evaluation of the formation included computer processes interpretation (CPI) using Interactive Petrophysics (IP) software.  Based on the results of CPI, Hartha Formation is divided into five reservoir units (A1, A2, A3, B1, B2), deposited in a ramp setting. Facies associations is added to well logs interpretation of Hartha Formation, and was inferred by a microfacies analysis of thin sections from core and cutting samples. The CPI shows that the A2 is the main oil- bearing unit, which is characterized by good reservoir properties, as indicated by high effective porosity, low water saturation, and low shale volume. Less important units include A1 and A3, because they have low petrophysical properties compared to the unit A2.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Communicable Diseases
Influence of Syphilis Infection on Abortions in Iraq
...Show More Authors

Introduction: Syphilis is a sexually transmitted disease, that may be transferred from mothers to infants during pregnancy if it is left untreated. Method: This study was conducted among 65 women who suffered from recurrent abortions in Iraq. Syphilis screening recombinant (IgM + IgG) level by ELISA, RADIM (Italy) and rapid plasma reagin (RPR) (positive and negative results) tests were used to analyse the data. Results: A non-significant association was observed with age (p=0.989), and the number of healthy births (p=0.643). Non-significant differences were observed in comparisons between smoker and non-smoker percentages in the study group. The rapid test for syphilis confirmation was applied using Rapid Plasma Reagin (RPR) tests.

... Show More
View Publication
Scopus (9)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
STUDY OF EMBARGO’S AFFECT ON CANCER IN IRAQ
...Show More Authors

different ?? ? injury ? This study aims to knowing the affect of embargo on cancer tutors in Iraq according to different body systems , In addition, this '?0 kinds study aims at knowing t^e categories ages that can be mostly injured by the cancer Egression analysis and descriptive statistics( median and frequency tables). ^?^???? have been used to achieve these two aims .This study includes ah the seventy cancer s Iraq from 1980-1998 and the data have been from the Ministry of Health / ?? tumors Iraqicancer board administration / central registry. The results of this study are emale productive? : Embargo has affected the ten different body systems as .? central nervous system and opthamamology , Hematology ,Respiratory ? system system , mal

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 1996
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SOME ACARINE ECTOPARASITES ON BATS IN MIDDLE IRAQ
...Show More Authors

A total of 61 bat specimens belonging to three species were collected from four distinct sites in the middle of Iraq. Five species of acarine ectoparasites on bats were found. These were: Steatonyssus periblepharus Kolenati, Spinturnix acuminatus (C. L. K.). Cheletonella sp. Rhizoglyphus sp., and Argas sp. Three of the recorded species were new to Iraqi fauna. The abundance and accurence of each parasite was varied from one species to another. S. periblepharus aria S. acuminatus were the most common species found in this study.

View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Mon Feb 24 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Pilgrims tracking and monitoring based on IoT
...Show More Authors
Abstract<p>The pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed </p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Effective Image Watermarking Method Based on DCT
...Show More Authors

Most includeding techniques of digital watermark even now working through the direct inclusion in the pixel without taking into account the level of compression (attack) that can go wrong, which makes digital watermark can be discarded easily. In this research, a method was proposed to overcome this problem, which is based on DCT (after image partitioned into non overlapped blocks with size 8×8 pixel), accompanied by a quantization method. The watermark (digital image) is embedded in DCT frequency domain seeking the blocks have highest standard deviation (the checking is only on the AC coefficients) within a predetermined threshold value, then the covered image will compressed (attacked) varying degrees of compression. The suggested met

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 16 2022
Journal Name
Iraqi Journal Of Science
New Arabic Stemming based on Arabic Patterns
...Show More Authors

Algorithms for Arabic stemming available in two main types which are root-based approach and stem-based approach. Both types have problems which have been solved in the proposed stemmer which combined rules of both main types and based on Arabic patterns (Tafealat1) to find the added letters. The proposed stemmer achieved root exploration ratio (99.08) and fault ratio (0.9).

View Publication Preview PDF
Publication Date
Mon May 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Retrieval Based on Coefficient Correlation Index
...Show More Authors

Image retrieval is an active research area in image processing, pattern recognition, and
computer vision. In this proposed method, there are two techniques to extract the feature
vector, the first one is applying the transformed algorithm on the whole image and the second
is to divide the image into four blocks and then applying the transform algorithm on each part
of the image. In each technique there are three transform algorithm that have been applied
(DCT, Walsh Transform, and Kekre’s Wavelet Transform) then finding the similarity and
indexing the images, useing the correlation between feature vector of the query image and
images in database. The retrieved method depends on higher indexing number. <

... Show More
View Publication Preview PDF