Preferred Language
Articles
/
Khj355gBVTCNdQwCmsII
A MODIFIED WATER INJECTION TECHNIQUE TO IMPROVE OIL RECOVERY: MISHRIF CARBONATE RESERVOIRS IN SOUTHERN IRAQ OIL FIELDS, CASE STUDY
...Show More Authors

A modified water injection technique has organized by this study to improve oil recovery of the Mishrif reservoirs using polymerized alkaline surfactant water (PAS-Water) injection. It is planned to modify the existing water injection technology, first to control and balance the hazardous troublemaker reservoir facies of fifty-micron pore sizes with over 500 millidarcies permeability, along with the non-troublemaker types of less than twenty micron pore sizes with 45 to 100 millidarcies permeability. Second to control Mishrif reservoirs rock-wettability. Special core analysis under reservoir conditions of 2250 psi and 90 °C has carried out on tens of standard core plugs with heterogeneous buildup, using the proposed renewal water flooding mechanism. The technique assures early PAS-water injection to delay the water-breakthrough from 0.045 – 0.151 pore volumes water injected with 8 – 25% oil recovery, into 0.15 – 0.268 pore volumes water injected with 18 to 32% improved oil recovery. As well as, crude oil-in-water divertor injection after breakthrough, within 0.3 to oil0.65 – 0.85-pore volume of water injected to decrease water cut 1 four 0 to 15%. The overall progress of the PAS-water injection has achieved residual oil mobility of 65%, and upgraded the 35 – 50% oil recovery range by less than three pore volume water injected with 20 – 60% water cut, compared with the same oil recovery range by more than ten pore volume water injected with around 70% water cut. The ultimate oil recovery improved by this technique is from 70% via more than 20 pore volume water injected with over 95% water cut by usual water injection, to 85 – 90% via 6.4 pore volume water injected with over 90% water cut by the modified water injection. The technique succeeded to lower the end-point mobility ratio to 1.5 from above five by usual water injection. It is highly recommended to use ten micron mesh filter at the main injection site and four or five micron mesh filter at the injector sites; to avoid more than 80% of the suspended particles and save as much as possible the overall reservoir facies from permeability damage.

Crossref
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Sentiment analysis in arabic language using machine learning: Iraqi dialect case study
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
A modified Mobilenetv2 architecture for fire detection systems in open areas by deep learning
...Show More Authors

This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.

Scopus Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Institutional Performance Assessment using a model of the European Foundation for Quality Management (EFQM) A case study at an organization
...Show More Authors

The study aims to use the European Excellence Model (EFQM) in assessing the institutional performance of the National Center for Administrative Development and Information Technology in order to determine the gap between the actual reality of the performance of the Center and the standards adopted in the model, in order to know the extent to which the Center seeks to achieve excellence in performance to improve the level of services provided and the adoption of methods Modern and contemporary management in the evaluation of its institutional performance.

The problem of the study was the absence of an institutional performance evaluation system at the centre whereby weaknesses (areas of improvement) and st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Nov 12 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The possibility of adopting a market approach to measure the fair value of biological assets in Iraq: (Applied study in Middle East Fish Production and Marketing Company)
...Show More Authors

The research aims to show the possibility of adopting the market approach to measure the fair value of biological assets in Iraq, by applying to a sample of the company listed on the Iraq Stock Exchange, where the Middle East Fish Production and Marketing Company was selected from among 7 companies representing the agricultural sector in Iraq, and according to the availability of data and for five years, the financial statements were presented of the measurement and disclosure of  biological assets at fair value according to the market approach, One of the most important conclusions reached by the researcher is the The possibility of measuring and disclosing biological assets at fair value according to the market approach in the Ira

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 27 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The IMPACT of SOCIAL ACCOUNTING on The AUDITOR’S REPORT ACCORDING to INTOSAI STANDARDS: A STUDY OF EMPLOYEES' PERCEPTIONS FEDERAL BOARD of SUPERVISORY AUDIT IN IRAQ
...Show More Authors

This research investigates the importance of social accounting and the auditor’s report. It basically checks if there is an impact of social accounting on the auditor’s report at the availability the INTOSAI standards No. (1700 and 1706). The study recruited 105 employees of the Federal Financial Supervision Office in Iraq. Data were collected using questionnaire. The questionnaire validity and reliability were checked to assure the truthfulness of the findings. The study found a positive correlation and a statistically significant effect between the accounting for social responsibility and the auditor’s report. It is necessarily recommended for the auditor and the bodies working in the Board of Supreme Audit to ensure the inclusio

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 15 2021
Journal Name
The Journal Of Legal And Social Sciences
Limitations on the authority of a judge in case-law ( France as a model )
...Show More Authors

When exercising their authority in the jurisprudence, judges are subject to a set of restrictions that they must adhere to, as they do not want their jurisprudence to be accepted and welcomed by law practitioners in general, and legal scholars in particular, and in contrast to it, the arrows of criticism and defamation will extend to that jurisprudence, and then they will have to reverse them . Perhaps the most important of those restrictions imposed on judges is their observance of justice between the parties to the lawsuit through their lack of bias for one of the parties at the expense of the other, in addition to their observance of public order and public morals, as well as their observance of the legal texts that they work under its u

... Show More
View Publication
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis

... Show More
View Publication Preview PDF