Preferred Language
Articles
/
q4blSoYBIXToZYALh4Er
Specifying Quality of a Tight Oil Reservoir through 3-D Reservoir Modeling
...Show More Authors

Increasing hydrocarbon recovery from tight reservoirs is an essential goal of oil industry in the recent years. Building real dynamic simulation models and selecting and designing suitable development strategies for such reservoirs need basically to construct accurate structural static model construction. The uncertainties in building 3-D reservoir models are a real challenge for such micro to nano pore scale structure. Based on data from 24 wells distributed throughout the Sadi tight formation. An application of building a 3-D static model for a tight limestone oil reservoir in Iraq is presented in this study. The most common uncertainties confronted while building the model were illustrated. Such as accurate estimations of cut-off permeability and porosity values. These values directly affect the calculation of net pay thickness for each layer in the reservoir and consequently affect the target of estimating reservoir initial oil in place (IOIP). Also, the main challenge to the static modeling of such reservoirs is dealing with tight reservoir characteristics which cause major reservoir heterogeneity and complexities that are problematic to the process of modeling reservoir simulation. Twenty seven porosity and permeability measurements from Sadi/Tanuma reservoir were used to validate log interpretation data for model construction. The results of the history matching process of the constructed dynamic model is also presented in this paper, including data related to oil production, reservoir pressure, and well flowing pressure due to available production.

Publication Date
Wed Aug 03 2022
Journal Name
Egyptian Journal Of Chemistry
A Novel Bio-electrochemical Cell with Rotating Cylinder Cathode for Cadmium Removal from Simulated Wastewater
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials & Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Oct 08 2018
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
TOTAL ORGANIC CARBON (TOC) PREDICTION FROM RESISTIVITY AND POROSITY LOGS: A CASE STUDY FROM IRAQ
...Show More Authors

     The open hole well log data (Resistivity, Sonic, and Gamma Ray) of well X in Euphrates subzone within the Mesopotamian basin are applied to detect the total organic carbon (TOC) of Zubair Formation in the south part of Iraq. The mathematical interpretation of the logs parameters helped in detecting the TOC and source rock productivity. As well, the quantitative interpretation of the logs data leads to assigning to the organic content and source rock intervals identification. The reactions of logs in relation to the increasing of TOC can be detected through logs parameters. By this way, the TOC can be predicted with an increase in gamma-ray, sonic, neutron, and resistivity, as well as a decrease in the density log

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Highly-charged EDTA-2Na salt as a novel draw solution in pressure-retarded Osmosis process
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Nov 03 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences( P-issn 1683 - 3597 E-issn 2521 - 3512)
Professional Challenges Facing Pharmacists Working at Public Hospitals in an Iraqi Province: A Qualitative Study
...Show More Authors

In Iraq, because of the dramatic turnovers facing the country for three decades, pharmacists continue to experience significant professional challenges in both the public and private sectors. The present study aimed to explore the professional challenges and obstacles facing Iraqi pharmacists working in public hospitals. This qualitative study included face-to-face semi-structured interviews with open-ended questions with hospital pharmacists. The participants were selected purposefully (with ≥ 3 years of experience) to work at governmental hospitals in Karbala province between December 2022 and April 2023. The audio-recording interviews were scripted. Thematic analyses were used to generate themes and subthemes from the interview

... Show More
View Publication
Scopus (7)
Crossref (8)
Scopus Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Radiology Case Reports
Intralobar pulmonary sequestration in elderly woman: a rare case report with emphasis on imaging findings
...Show More Authors

View Publication
Scopus (8)
Crossref (10)
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Sensors
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
...Show More Authors

Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Sep 09 2020
Journal Name
Academic Journal Of Legal And Political Research
Unilateral Contracts – A Comparative Study under the Anglo-American System and the Iraqi Civil Law
...Show More Authors

At a time when the general rules in the different legal systems require the presence of two parties to the contract, one of which is issued the first expression of the will and is called the offer, and the other is issued from the other and is called the acceptance. A special type of contracts emerged in the beginning of the last century called the “unilateral contracts”. The side sparked a major jurisprudential dispute, as well as the issuance of several contradictory judicial rulings on it. Hence, this research came to highlight this special type of contract. Key words: the definition of a unilateral contract, its distinction from other legal situations, and its effects.

View Publication