Preferred Language
Articles
/
ijcpe-970
Evaluation of the Mishrif Formation Using an Advanced Method of Interpretation
...Show More Authors

The Mishrif Formation is one of the most important geological formations in Iraq consisting of limestone, marl, and shale layers since it is one of the main oil producing reservoirs in the country, which contain a significant portion of Iraq's oil reserves. The formation has been extensively explored and developed by the Iraqi government and international oil companies, with many oil fields being developed within it. The accurate evaluation of the Mishrif formation is key to the successful exploitation of this field. However, its geological complexity poses significant challenges for oil production, requiring advanced techniques to accurately evaluate its petrophysical properties.

   This study used advanced well-logging analysis techniques, including mineralogical inversion with the Quanti-Elan model employed in Schlumberger's Techlog software to evaluate this formation. The lithology, clay volume, porosity, permeability, and hydrocarbon saturation data were obtained from the open hole logging of three wells in a southern Iraqi oil field. The environmental correction was applied for open-hole logging tools, and the primary mineral of the formation was determined using porosity log cross-plotting. Pickett plot technique was utilized to determine water resistivity and Archie's parameters, and the reconstruction log was generated based on volumetric and response parameters for each component. Based on thorough analysis, the clay volume of the Mishrif formation is estimated to be about 10%, which is a common value for this rock type. The porosity was computed based on the total fluid volume, ranging from 11% to 14%, and water saturation was determined using Archie's equation. The final results of the volume of each component for rock and fluid are presented using computer programming interpretation. The results of this study provide valuable insights into the petrophysical properties of the Mishrif formation and are expected to inform for better interpretation and evaluation of petrophysical properties of similar formations, which is essential for optimum field development planning as well as minimising the uncertainties.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Iraqi Journal Of Physics
Photometry Technique to Map Elements’ Distribution on Comets’ Nuclei Surfaces Using a New Method
...Show More Authors

This study is unique in this field. It represents a mix of three branches of technology: photometry, spectroscopy, and image processing. The work treats the image by treating each pixel in the image based on its color, where the color means a specific wavelength on the RGB line; therefore, any image will have many wavelengths from all its pixels. The results of the study are specific and identify the elements on the nucleus’s surface of a comet, not only the details but also their mapping on the nucleus. The work considered 12 elements in two comets (Temple 1 and 67P/Churyumoy-Gerasimenko). The elements have strong emission lines in the visible range, which were recognized by our MATLAB program in the treatment of the image. The percen

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Clinical And Experimental Dentistry
Eradication of mature biofilm from the isthmus region using Er, Cr: YSGG Laser as an activator of 2% chlorhexidine gluconate
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Wed May 20 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Validity of 3D Reconstructed Computed Tomographic Image in Using Craniometrical Measurements of the Skull for Sex Differentiation (An Iraqi Study)
...Show More Authors

Background: The skull offers a high resistance of adverse environmental conditions over time, resulting in the greater stability of the dimorphic features as compared to other skeletal bony pieces. Sex determination of human skeletal considered an initial step in its identification. The present study is undertaken to evaluate the validity of 3D reconstructed computed tomographic images in sex differentiation by using craniometrical measurements at various parts of the skull. Materials and Method: 3D reconstructed computed tomographic scanning of 100 Iraqi subject, (50 males and 50 females) were analyzed with their age range from20-70 years old. Craniometrical linear measurements were located and marked on both side of the 3D skull images.

... Show More
View Publication Preview PDF
Publication Date
Wed May 20 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the anterior loop of the mental nerve incidence and extension in different age groups in Sulaimania city using digital panoramic imaging system
...Show More Authors

Background: The anterior loop of mental nerve is commonly described as that part of the neurovascular bundle that transverses anterior and inferior to the mental foramen only to loop back to exit the mental foramen. The aim of the study is to evaluate the incidence and extension of anterior loop of mental nerve by using digital panoramic imaging system to avoid nerve damage during different surgical procedures in dentistry. Materials and Method: Panoramic image was taken for all 400 patients and stored in the computer. Then Horizontal and Vertical for the anterior loop extension when exist was measured and recorded in a special case sheet prepared for each subject. Results: Results indicated that out of 400 patients there were only 25 pat

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
PREPARATION OF ACTIVATED CARBONS FROM DATE STONES BY CHEMICAL ACTIVATION METHOD USING FeCl3 and ZnCl2 as ACTIVATING AGENTS
...Show More Authors

Date stones were used as precursor for the preparation of activated carbons by chemical
activation with ferric chloride and zinc chloride. The effects of operating conditions represented
by the activation time, activation temperature, and impregnation ratio on the yield and adsorption
capacity towards methylene blue (MB) of prepared activated carbon by ferric chloride activation
(FAC) and zinc chloride activation (ZAC) were studied. For FAC, an optimum conditions of 1.25
h activation time, 700 °C activation temperature, and 1.5 impregnation ratio gave 185.15 mg/g
MB uptake and 47.08 % yield, while for ZAC, 240.77 mg/g MB uptake and 40.46 % yield were
obtained at the optimum conditions of 1.25 h activation time, 500

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Oct 01 2014
Journal Name
Engineering And Technology Journal
Investigating Forward kinematic Analysis of a 5-axes Robotic Manipulator using Denavit-Hartenberg Method and Artificial Neural Network
...Show More Authors

View Publication
Crossref
Publication Date
Fri Aug 19 2022
Journal Name
Mathematical Statistician And Engineering Applications (msea)
Application of TOPSIS method for Multi-Criteria Decision Making for poultry fields By using GIS in Hilla district
...Show More Authors

Statistical methods and statistical decisions making were used to arrange and analyze the primary data to get norms which are used with Geographic Information Systems (GIS) and spatial analysis programs to identify the animals production and poultry units in strategic nutrition channels, also the priorities of food insecurity through the local production and import when there is no capacity for production. The poultry production is one of the most important commodities that satisfy human body protein requirements, also the most important criteria to measure the development and prosperity of nations. The poultry fields of Babylon Governorate are located in Abi Ghareg and Al_Kifil centers according to many criteria or factors such as the popu

... Show More
Publication Date
Mon Nov 28 2022
Journal Name
F1000research
In vitro apical microleakage evaluation for different endodontic sealers by spectrophotometric analysis: an observational study
...Show More Authors

Background: It has been established that several filling techniques can affect apical leakage, which is responsible for 59% of endodontic failures. The primary goal of endodontic therapy is to create a tight seal that aids in repairing the periapical tissues, prevents apical periodontitis, and shields against root canal infection. The study aims to compare the apical sealing ability of epoxy resin based sealer  (AH plus), which is an epoxy-resin-based root canal sealer, GuttaFlow 2, which is a silicone-based root canal sealer, GuttaFlow bioseal is a bioactive glass-based root canal sealer, TotalFill HiFlow bioceramic (BC) sealer is a silicate-based root canal sealer (bioceramic sealer) using a single cone techn

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref