Preferred Language
Articles
/
ijcpe-815
Digital Rock Samples Porosity Analysis by OTSU Thresholding Technique Using MATLAB
...Show More Authors

Porosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in resulting binary image. This paper presents the possibilities of using image processing for determining digital 2D rock samples porosity in carbonate reservoir rocks. MATLAB code created which automatically segment and determine the digital rock porosity, based on the OTSU's thresholding algorithm. In this work, twenty-two samples of 2D thin section petrographic image reservoir rocks of one Iraqi oil field are studied. The examples of thin section images are processed and digitized, utilizing MATLAB programming. In the present study, we have focused on determining of micro and macroporosity of the digital image. Also, some pore void characteristics, such as area and perimeter, were calculated. Digital 2D image analysis results are compared to laboratory core investigation results to determine the strength and restrictions of the digital image interpretation techniques. Thin microscopic image porosity determined using OTSU technique showed a moderate match with core porosity.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 21 2022
Journal Name
Surgical Neurology International
SNI/SNI Digital-Baghdad neurosurgery educational series
...Show More Authors
Background:

Access to high-quality neurosurgery online learning is limited in low- and middle-income countries, and Iraq is part of this category. The need for collaboration and connection of people worldwide to exchange ideas and experiences in neurosurgery is a challenge. Surgical Neurology International® (SNI)/SNI Digital stimulated the establishment of the joint effort to bring the discussion about the best experiences in neurosurgery from the United States and Iraq together in an internet meeting format.

Methods:

An online survey was formulated and distributed to the attendees of the SNI-Baghdad neurosurgery

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (8)
Scopus Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Digital technologies in the means of communication
...Show More Authors

Modern digital technologies have affected the means of communication in terms of structure, function and methods of dealing with them, and the communication process has changed, becoming bilateral, reciprocal and interactive, after it was one-way and limited in circulation and the roles changed, so the receiver became the sender and reversed is correct, and the culture of the active user and the participant spread, and the communication process became continuous.
The international information network has provided new electronic channels in the media and communication that are not known and opened a new era for these means, which led to a trend towards digital media in an unprecedented way.
The new communication platforms are the re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Aip Conference Proceedings
Measurement radon concentrations in samples for drinking water
...Show More Authors

The principal forms of radiation dosage for humans from spontaneous radiation material are being recognized as radon and its progenitors in the interior environment. Radiation-related health risks are caused by radon in water supply, which can be inhaled or ingested. Materials and Methods: The solid-state CR-39 nuclear trace detectors method was using in this research for measuring accumulation of radioactivity in water supply in different locations of Iraq's southwest corner of Baghdad. In Baghdad district, 42 samples were selected from 14 regions (3 samples out of each region) and put in dosimeters for 50 days. Results: The mean radon concentration was 49.75 Bq/m3, that is lower than the internationally recognized limit of 1100 Bq /m3. Th

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 16 2025
Journal Name
International Journal Of Engineering Pedagogy (ijep)
Utilizing Machine Learning Techniques to Predict University Students' Digital Competence
...Show More Authors

Given the importance of possessing the digital competence (DC) required by the technological age, whether for teachers or students and even communities and governments, educational institutions in most countries have sought to benefit from modern technologies brought about by the technological revolution in developing learning and teaching and using modern technologies in providing educational services to learners. Since university students will have the doors to work opened in all fields, the research aims to know their level of DC in artificial intelligence (AI) applications and systems utilizing machine learning (ML) techniques. The descriptive approach was used, as the research community consisted of students from the University

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
2D and 3D Modeling of Rock Mechanical Properties of Khasib Formation in East Baghdad Oil Field
...Show More Authors

Knowing the distribution of the mechanical rock properties and the far field stresses for the field of interest is an important task for many applications concerning reservoir geomechanics, including wellbore instability analysis, hydraulic fracturing, sand production, reservoir compaction, and subsidence. A major challenge with determining the rock's mechanical properties is that they cannot be directly measured at the borehole. Furthermore, the recovered carbonate core samples for performing measurements are limited and they provide discrete data for specific depths.

   The purpose of this study is to build 2D and 3D geomechanical models of the Khasib reservoir in the East Baghdad oil field/ Central area. TECHLOG.2015.3 softwa

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
The Effects of Different Water Types on the Dissolution, Physical Appearance, and Compressive Strength of Gypsum Rock
...Show More Authors

Dissolution of gypsum rock in water is significant, which may result in hydrocarbon reservoir formation and evaporate deposits. However, the complexity of the gypsum dissolution process is still of interest because of its uncleanness that requires more critical analysis. The objectives of this experimental study are emphasis on the dissolution characteristics of gypsum rock under room temperature and by various types of water; namely: deionized, tap, fresh, acidic, well, and normal rainwatre. In addition, the influences of dissolution on gypsum rock's mechanical and physical characteristics. Gypsum rock was obtained from Agjalar area, in the southwest of Sulaymaniyah city, Northern Iraq. Experimental results show that we

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 07 2022
Journal Name
Journal Of Nuclear Engineering And Radiation Science
Radon and Exhalation Rate Measurement of Soil Samples in Al-Amiriya Area in Baghdad Governorate Using a Nuclear Track Detector
...Show More Authors
Abstract<p>Radon is the most dangerous natural radioactive component affecting the human population, since it is a radioactive gas that results from the decomposition process of uranium deposits in soil, rocks, and water, and it is damaging both humans and the ecosystem. The radon concentrations and exhalation rate in soil samples from various locations were determined using a passive approach with a CR-39 (CR-39 is Columbia Resin #39; it is allyl diglycol carbonate C12H18O7) detector in Amiriya region in Baghdad Governorate. The average values of radon concentrations are ranged from 47.3 to 54.2 Bq·m−3. From the obtained results, we can conclude that the values of all studied locations are</p> ... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref