Preferred Language
Articles
/
ijs-7577
Setting-up a 3D Integrated Petrophysical Model Using Petrel software for Mishrif Formation in Garraf Oil Field, Southern Iraq
...Show More Authors

Setting-up a 3D geological model both from field and subsurface data is a typical task in geological studies involving natural resource evaluation and hazard assessment. In this study a 3D geological model for Mishrif Formation in Garraf oil field has been set-up using Petrel software. Mishrif Formation represents the most important reservoir in Garraf oil field. Four vertical oil wells (GA-4, GA-A1P, GA-3 and GA-5) and one directional well (GA-B8P) were selected in Garraf Oil Field in order to set-up structural and petrophysical (porosity and water saturation) models represented by a 3D static geological model in three dimensions. Structural model shows that Garraf oil field represents a domal structure that shows continuous growth as indicated by the structural maps at top of reservoir units. The structural closure is shifted from GA-3 well to GA-A1P well. Mishrif Formation was divided into ten zones (top Mishrif, M1, M1.2, M2, L1, L1.2, L2, L2.2, L2.3 and L2.4.). Petrophysical model (porosity and water saturation) for Mishrif Formation was set-up from values of porosity and water saturation using Sequential Gaussian Simulation algorithm. According to data analyses and the results from modeling the units (M1.2, L1 and L1.2) are considered as high quality reservoir units due to the high PHIE and low water saturation. Units (L2, L2.2, L2.3 and L2.4) are considered as poor reservoirs because of low PHIE and high water saturation, and non-reservoir units include (Top Mishrif, M1 and M2) therefore, they represent cap units. Cross sections of petrophysical model were conducted to illustrate the vertical and horizontal distribution of porosity and water saturation between wells in the field.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jul 20 2021
Journal Name
Materials Science Forum
Investigation into the Distribution of Erosion-Corrosion in the Furnace Tubes of Oil Refineries
...Show More Authors

Crude oil is one of the most important sources of energy in the world. To extract its multiple components, we need oil refineries. Refineries consist of multiple parts, including heat exchangers, furnaces, and others. It is known that one of the initial operations in the refineries is the process of gradually raising the temperature of crude oil to 370 degrees centigrade or higher. Hence, in this investigation the focus is on the furnaces and the corrosion in their tubes. The investigation was accomplished by reading the thickness of the tubes for the period from 2008 to 2020 with a test in every two year, had passed from their introduction into the work. Where the thickness of more than one point was measured on each tube in the sa

... Show More
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Study the Effect of Ocimum basilscm oil in the Sensory properties of Laboratory Biscuit
...Show More Authors

The study aims at showing the effect of basil oil on the sensory properties of the laboratory biscuits. the results show the sensory valuation before and after the storage. the (A4) equation exceeds 15% of T exchange (3 , 4 , 5 g. basil 19 , 55 g . fats )in most of the studied sensuous qualities. Then, the (A5) equation of 20% exchange percentage (4.60g. basil oil + 18.40g. fats). Then, the (A3) equation of 10% exchange percentage (2.30g. basil oil + 20.70g. fats). Then the (A2) equation of 5% exchange percentage (1.5g. basil oil + 21.85g. fats). Finally, the control equation (A1) received the lower value of sensuous evaluation and general acceptance. Abstract differences also appeared at denotation level 0.05 between the (A2)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 10 2018
Journal Name
Day 3 Wed, December 12, 2018
Experimental Comparison between WASP and LSASF in Bartlesville Sandstone Reservoir Cores Bearing Heavy Oil
...Show More Authors

Low salinity (LS) water flooding is a promising EOR method which has been examined by many experimental studies and field pilots for a variety of reservoirs and oils. This paper investigates applying LS flooding to a heavy oil. Increasing the LS water temperature improves heavy oil recovery by achieving higher sweep efficiency and improving oil mobility by lowering its viscosity. Steam flooding projects have reported many problems such as steam gravity override, but override can be lessened if the steam is is alternated with hot LS water. In this study, a series of reservoir sandstone cores were obtained from Bartlesville Sandstone (in Eastern Kansas) and aged with heavy crude oil (from the same reservoir) at 95°C for 45 days. Five reservo

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Geological Journal
Depositional Architecture and Stratigraphic Framework of Albian Succession in Balad and Nasiyia Oil Fields
...Show More Authors

The Albian Carbonate-clastic succession in the present study is represented by the Mauddud and Nahr Umr formations were deposited during the Albian stage within the Wasia Group More than 200 thin sections of cores and cuttings in addition to well logs data for Nahr Umr and Mauddud formations from 4 boreholes within two oil fields (Ba-4, Ba-8, Ns-2 and Ns-4) were used to interpret the different associations facies as well as the facies architectures to describe the sedimentary framework of the basin and development the petrophysical properties. Seven major microfacies were diagnosed in the carbonate succession of the Mauddud Formation, while the Nar Umr Formation includes five lithofacies; their grain types characteristic and deposit

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Estimation of Extract Yield and Mass Transfer Coefficient in Solvent Extraction of Lubricating Oil
...Show More Authors

An investigation was conducted to suggest relations for estimating yield and properties of the improved light lubricating oil fraction produced from furfural extraction process by using specified regression.

Mass transfer in mixer-settler has been studied. Mass transfer coefficient of continuous phase, mass transfer coefficient of dispersed phase and the overall mass transfer coefficient extraction of light lubes oil distillate fraction by furfural are calculated in addition to all physical properties of individual components and the extraction mixtures.

The effect of extraction variables were studied such as extraction temperature which ranges from 70 to 110°C and solvent to oil ratio which ranges from 1:1 to 4:1 (wt/wt

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Solving a three dimensional transportation problem using linear programming
...Show More Authors

Transport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,

... Show More
View Publication Preview PDF
Crossref