Preferred Language
Articles
/
joe-1655
Introduction and Investigation into Oil Well Logging Operations (Review)
...Show More Authors

ole in all sta

Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with the well. Many bases on which well probes are depend on obtaining information, and preventing the rocks from responding to stimuli sent by special devices, whether those stimuli are electrical, radioactive, or acoustic. In addition, there are electrically controlled mechanical bases used to measure the diameter of the well, its flow, pressure, perforation, and taking samples. Wireline refers to the technique of using the cable to deliver special equipment to the bottom of the well to repair, evaluation, or equipment recovery. A simple wireline consists of a shiny metal wire (called a slickline) that is very durable for tensile and wear operations. It is of (0.108" or 0.125") diameter. The equipment is installed at the end of the wire. Still, sometimes a braided cable is used from many small steel wires (Braided line), which makes it stronger and heavier than the first type. The information obtained from the logs is considered to assess geological areas based on porosity, permeability, hydrocarbon fluids, and shale ratio.  Well logging uses logs that are much cheaper than core operations and also cheaper than the information obtained from drilling mud. This review aims to pinpoint on the most important logging processes used in oil wells, as well logs have an effective role in all stages of the oil industry.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 20 2019
Journal Name
Drug Invention Today
Preparation and evaluation of lornoxicam film-forming gel
...Show More Authors

Scopus (7)
Scopus
Publication Date
Fri Mar 18 2022
Journal Name
Aro-the Scientific Journal Of Koya University
Detecting Deepfakes with Deep Learning and Gabor Filters
...Show More Authors

The proliferation of many editing programs based on artificial intelligence techniques has contributed to the emergence of deepfake technology. Deepfakes are committed to fabricating and falsifying facts by making a person do actions or say words that he never did or said. So that developing an algorithm for deepfakes detection is very important to discriminate real from fake media. Convolutional neural networks (CNNs) are among the most complex classifiers, but choosing the nature of the data fed to these networks is extremely important. For this reason, we capture fine texture details of input data frames using 16 Gabor filters indifferent directions and then feed them to a binary CNN classifier instead of using the red-green-blue

... Show More
View Publication
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Engineering
Predicted Affinity Ratio between Asphalt Binder and Aggregate
...Show More Authors

Affinity is a term used to describe the amount of the adhesion bond between asphalt binder and aggregate. Adhesion force may be used as indicator to the amount of energy or work required to breakdown the adhesive bond between asphalt binder and aggregate. In order to study affinity between asphalt binder and aggregate, a modified device is manufacture locally similar to Rolling Bottle Test (RBT) to Predicted the degree of affinity between asphalt binder and aggregate; taking into consideration mineral composition with physical properties of asphalt binder to measure required force to separate asphalt binder from aggregate surface. In this study, suggest new parameters to represent the stripping or affinity phenomena (aff

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Comparison between Electroplating and Electroless on Plastic Surface
...Show More Authors

 

We report a method of converting non-conductive plastic surfaces into conductive by plating either copper electroless or copper electroplating -carbon black containing bending Agent onto Perspex plastics . Various approaches have been studied in order to comparing properties of the plated copper for two methods such as scanning electron microscopy (SEM),thickness, roughness, porosity, tensile Strength and elongation. The results show that the surface of electroplating was uniform, compact, and continuous and it had an obvious metallic sheen, while the surface of plated copper for electroless for it had many pores. Also observed that the coating was composed of small cells. Thes

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Grammatical and rhetorical methods   In Surat Al - Iftar
...Show More Authors

I started writing the research because of the linguistic and rhetorical methods in the Holy Quran.
This Sura included in all its verses the plural form such as the word planets graves and seas except the word sky was singular as the name of a genus, and this Sura showed the horrors of the Day of Judgment at the world level Included another science is the science of the interview and also came in the repetition and deletion and other linguistic and rhetorical things and concluded this Sura that the goal of breaking the sky and scattering planets and scatter graves is the human himself.
The Koran is a miracle immortal and science is still drawn from him each according to his specialty.

View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
COMPUTER-BASED ECG SIGNAL ANALYSIS AND MONITORING SYSTEM
...Show More Authors

This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Al–bahith Al–a'alami
Legal Legislation and Freedom of Expression / Historical Approach
...Show More Authors

Freedom of opinion and expression occupy the first place among the concerns of countries and international organizations. And it is also the basis of contemporary freedom because it is the foundation for achieving freedom in other fields such as politics, economics, education, etc.. The constitutions of the state have ensured that almost the entire freedom to express an opinion in all its forms either orally or writing or images of expressions, but these freedoms are identified within the law. Most countries announced their commitment to the international conventions and texts issued by international and regional organization like the Universal Declaration of Human Rights in 1948, and the International Covenant on Civil and Political Rig

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 17 2020
Journal Name
College Of Islamic Sciences
Human values and principles in the three religions
...Show More Authors

The laws of the three religions tend to extend the rules and foundations of coexistence, and this is achieved in achieving the values and principles that these laws have nourished in all societies.

Our research deals with a major problem that has broken out in our societies, namely (disturbing the balance of values and behavioral standard between people), and perhaps one of the greatest causes of the problem is to move away from the correct divine discourse and sound approach, as well as corruption of common sense and the violation of its rules and found principles in the hearts of people.

 

 

 

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Popular Mobilization and human security In Local Society
...Show More Authors

The definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions,  Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.

View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref