Preferred Language
Articles
/
ijs-1539
Hartha Formation divisions Based on Well Logs Analysis in Majnoon Oil Field, Southern Iraq
...Show More Authors

This study aims to evaluate reservoir characteristics of Hartha Formation in Majnoon oil field based on well logs data for three wells (Mj-1, Mj-3 and Mj-11). Log interpretation was carried out by using a full set of logs to calculate main petrophysical properties such as effective porosity and water saturation, as well as to find the volume of shale. The evaluation of the formation included computer processes interpretation (CPI) using Interactive Petrophysics (IP) software.  Based on the results of CPI, Hartha Formation is divided into five reservoir units (A1, A2, A3, B1, B2), deposited in a ramp setting. Facies associations is added to well logs interpretation of Hartha Formation, and was inferred by a microfacies analysis of thin sections from core and cutting samples. The CPI shows that the A2 is the main oil- bearing unit, which is characterized by good reservoir properties, as indicated by high effective porosity, low water saturation, and low shale volume. Less important units include A1 and A3, because they have low petrophysical properties compared to the unit A2.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Engineering
Evaluation of Textile Filter in Field Drains
...Show More Authors

The role of drain in agricultural lands is to remove excess surface and subsurface water to create a good environment for root growth and to increase crops yield. The main objective of this research was to evaluate the performance of closed drains when using textile filter instead of crushed gravel filter. The research has been executed in the laboratory using a sand tank model and by using two types of the soil. One of soils was light soil (sandy soil) and the other heavy soil (loamy soil). The tests were classified into four cases; each case was supplied discharge during 10 days. The results showed that the amount of out flow when using graded crushed gravel filter is greater than the amount of out flow in case of usin

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 12 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Ion Beam Focusing in Solenoid Magnetic Field
...Show More Authors

   The present study investigates the main parameters effect on the solenoid design as converging lens of charged particle beam passing through it. These parameters are solenoid magnetic field (B), solenoid radius (Ro) and the solenoid total length (L). The result indicates that the solenoid system is very sensitive to the change of these parameters. The solenoid acts as converge lens but may convert to diverging lens at some conditions. The best design obtained at (L=1100 mm, B=5000 gauss and Ro=150 mm).      
 

View Publication Preview PDF
Publication Date
Thu Feb 02 2023
Journal Name
Biogecko
Hematological analysis of bromelain conjugated on silver nanoparticles in Balb/c mice
...Show More Authors

The wound healing process is incredibly intricate, consisting of a series of cellular activities. Although, this complex process has the potential to degenerate and result in chronic wound problems that are resistant to biological healing mechanisms. Nanoparticles can help to reduce inflammation, promote tissue regeneration, and accelerate wound healing. The proteolytic enzymes are believed to break down proteins and other molecules that can cause inflammation and impede the healing process. Wound was created in vivo using adult mice, and by taking blood samples the hematological parameters were evaluated to detected the effects of bromelain, silver nanoparticles and Br-AgNPs. The results shows an increased in white blood cells WBC, RBC, MC

... Show More
Publication Date
Tue Nov 01 2022
Journal Name
Aci Structural Journal
Stress at Ultimate in Internally Unbonded Steel Based on Genetic Expression Programming
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Propose an Efficient Face Recognition Model in WSN Based on Zak Transform
...Show More Authors

The need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Watershed Transform Based on Clustering Techniques to Extract Brain Tumors in MRI
...Show More Authors

In this work, watershed transform method was implemented to detect and extract tumors and abnormalities in MRI brain skull stripped images. An adaptive technique has been proposed to improve the performance of this method.Watershed transform algorithm based on clustering techniques: K-Means and FCM were implemented to reduce the oversegmentation problem. The K-Means and FCM clustered images were utilized as input images to the watershed algorithm as well as of the original image. The relative surface area of the extracted tumor region was calculated for each application. The results showed that watershed trnsform algorithm succeedeed to detect and extract the brain tumor regions very well according to the consult of a specialist doctor a

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Proposed Hiding Text in Text Based On RNA for Encoding Secret Information
...Show More Authors

In any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
New Research Trends in Designing E-Government Architecture Based on Blockchain Technology
...Show More Authors

Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated.  This work studies and analyzes some research trends focused on blockchain

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Digital Watermarking in Color Image Based On Joint Between DCT and DWT
...Show More Authors

The massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by

... Show More
View Publication Preview PDF
Crossref