Preferred Language
Articles
/
joe-1097
An An Accurate Estimation of Shear Wave Velocity Using Well Logging Data for Khasib Carbonate Reservoir - Amara Oil Field
...Show More Authors

   

Shear and compressional wave velocities, coupled with other petrophysical data, are vital in determining the dynamic modules magnitude in geomechanical studies and hydrocarbon reservoir characterization. But, due to field practices and high running cost, shear wave velocity may not available in all wells. In this paper, a statistical multivariate regression method is presented to predict the shear wave velocity for Khasib formation - Amara oil fields located in South- East of Iraq using well log compressional wave velocity, neutron porosity and density. The accuracy of the proposed correlation have been compared to other correlations. The results show that, the presented model provides accurate estimates of shear wave velocity with correlation coefficient of about unity than other currently available methods.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 01 2023
Journal Name
Petroleum Research
Investigating tight oil reservoir production performance: Influence of geomechanical parameters and their distribution
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Sep 22 2022
Journal Name
Veterinary Medicine International
Mentha piperita Oil Exerts an Antiepileptic Effect in Pilocarpine and Pentylenetetrazol-Induced Seizures in Mice
...Show More Authors

Introduction. Epilepsy is a progressive, chronic neurological disorder characterized by recurrent seizures. Peppermint (Mentha piperita L.) (MP) is one of the most commonly ingested herbal teas or tisanes with a single component. Aim. We aimed to assess the potential antiepileptic and neuroprotective features of MP essential oil (MPO) in pilocarpine (P) and pentylenetetrazol (PTZ) models of epilepsy. Methods. The study used eight groups of mice to assess the anticonvulsant activity of MPO in both the P and PTZ acute models in mice. P (350 mg/kg, i.p.) was given 30 minutes after MPO (1.6, 3.2, and 6.4 ml/kg, i.p.). As a positive control group, diazepam (1 mg/kg, i.p) was used. PTZ (95 mg/kg, i.p.) was given 30 minutes after M

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
A Comparison of Different Estimation Methods to Handle Missing Data in Explanatory Variables
...Show More Authors

Missing data is one of the problems that may occur in regression models. This problem is usually handled by deletion mechanism available in statistical software. This method reduces statistical inference values because deletion affects sample size. In this paper, Expectation Maximization algorithm (EM), Multicycle-Expectation-Conditional Maximization algorithm (MC-ECM), Expectation-Conditional Maximization Either (ECME), and Recurrent Neural Networks (RNN) are used to estimate multiple regression models when explanatory variables have some missing values. Experimental dataset were generated using Visual Basic programming language with missing values of explanatory variables according to a missing mechanism at random general pattern and s

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Aquatic Geochemistry
The Origin and MgCl2–NaCl Variations in an Athalassic Sag Pond: Insights from Chemical and Isotopic Data
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Evaluation the Effect of Velocity and Temperature on the Corrosion Rate of Crude Oil Pipeline in the Presence of CO2/H2S Dissolved Gases
...Show More Authors

In this paper investigate the influences of dissolved CO2/H2S gases, crude oil velocity and temperature on the rate of corrosion of crude oil transmission pipelines of Maysan oil fields southern Iraq. The Potentiostatic corrosion test technique was conducted into two types of carbon steel pipeline (materials API 5L X60 and API 5L X80). The computer software ECE electronic corrosion engineer was used to predict the influences of CO2 partial pressure, the composition of crude oil, flow velocity of crude oil and percentage of material elements of carbon steel on the rate of corrosion. As a result, the carbon steel API 5L X80 indicates good and appropriate resistance to corrosion compared to carbon steel API

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Sep 03 2012
Journal Name
The International Archives Of The Photogrammetry, Remote Sensing And Spatial Information Sciences
CALIBRATION OF FULL-WAVEFORM ALS DATA BASED ON ROBUST INCIDENCE ANGLE ESTIMATION
...Show More Authors

Abstract. Full-waveform airborne laser scanning data has shown its potential to enhance available segmentation and classification approaches through the additional information it can provide. However, this additional information is unable to directly provide a valid physical representation of surface features due to many variables affecting the backscattered energy during travel between the sensor and the target. Effectively, this delivers a mis-match between signals from overlapping flightlines. Therefore direct use of this information is not recommended without the adoption of a comprehensive radiometric calibration strategy that accounts for all these effects. This paper presents a practical and reliable radiometric calibration r

... Show More
View Publication
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Al–bahith Al–a'alami
The Educational Role of Children's Programs in Libyan TV An Analytical -Field Study of "Flowers of Life" Program
...Show More Authors

Television contributes children the acquisition of knowledge, moral and social values through programs that are offered to them and the extent of the focus on the effective aspects of life in the age of the target stage. The subject of this research aims to know the children programs in Libya television through a comprehensive analytical study of the program entitled “zihur al-hayat” within the broadcast season from April 1, 2004 to June 30, 2004. It also focuses on trying to identify the Libyan television policy in broadcast educational content through the children's programs in the prevailing political and social conditions during the period of study as well as knowing the opinions of the children's sample under study in Al-Baidhaa

... Show More
View Publication Preview PDF
Crossref