Preferred Language
Articles
/
joe-545
Permeability Estimation by Using the Modified and Conventional FZI Methods
...Show More Authors

There many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr formation based on the four straight lines. The permeability was calculated by two methods for comparison and choosing the best.  The modified FZI method gives better results because the predicted permeability by this method demonstrates a coefficient of correlation (R2) higher than that of the conventional approach, where the value of R2 is 0.9645 of  modified FZI method while 0.892 of the conventional approach. When plotting RQI versus  on a log-log scale, all core samples with similar FZI values will lie on a straight line with a unit slope. Other core samples that have different FZI values will lie on other parallel lines. All lines in (RQI and ) plot of modified FZI method have unit slop and more parallel than these of the conventional approach. The plot of probability cumulative of FZIm is used to determine number of hydraulic flow unit for Nahr Umr formation. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hus for Nahr Umr formation based on the four straight lines, these four straight lines of modified FZI method was more distinguished than these of the conventional approach.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Geological Journal
Purification of Aqueous Solutions from Nickel Using Ceramic Waste
...Show More Authors

This study aims to test ceramic waste's capacity to remove nickel from aqueous solutions through adsorption. Ceramic wastes were collected from the Refractories Manufacturing Plant in Ramadi. Through a series of lab tests, the reaction time (5, 10, 15, 20, 25, 30, 35, 40, 45, and 50 minutes, and Ni concentrations (20, 40, 60, and 80) were tested using ceramic wastes with a solid to liquid ratio of 2g/30ml. At a temperature of 30ºC, the pH, total dissolved solids (TDS), and electrical conductivity (EC) were all measured. The equilibrium time was set at 30 min. Thereafter, the sorption (%) somewhat increased positively with the Ni concentration. Freundlich's equation showed that the adsorption intensity is 1.1827 and the Freundlich c

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 29 2018
Journal Name
International Journal Of Women's Health And Reproduction Sciences
Prediction of Placenta Accreta Using Hyperglycosylated Human Chorionic Gonadotropin
...Show More Authors

Objectives: Hyperglycosylated human chorionic gonadotropin (hCG) is a variant of hCG. In addition, it has a different oligosaccharide structure compared to the regular hCG and promotes the invasion and differentiation of peripheral cytotrophoblast. This study aimed to measure hyperglycosylated hCG as a predictor in the diagnosis of placenta accreta. Materials and Methods: In general, 90 pregnant women were involved in this case-control study among which, 30 ladies (control group) were pregnant within the gestational age of ≥36 weeks with at least one previous caesarean section and a normal sited placenta in transabdominal ultrasound (TAU). The other 60 pregnant women (case

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Nov 25 2015
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Subject Independent Facial Emotion Classification Using Geometric Based Features
...Show More Authors

Accurate emotion categorization is an important and challenging task in computer vision and image processing fields. Facial emotion recognition system implies three important stages: Prep-processing and face area allocation, feature extraction and classification. In this study a new system based on geometric features (distances and angles) set derived from the basic facial components such as eyes, eyebrows and mouth using analytical geometry calculations. For classification stage feed forward neural network classifier is used. For evaluation purpose the Standard database "JAFFE" have been used as test material; it holds face samples for seven basic emotions. The results of conducted tests indicate that the use of suggested distances, angles

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Studying Hueckel edge detector using binary step edge image
...Show More Authors

Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Civil And Environmental Engineering
Constructing a Corrected Stations Network Using Some Geomatic Techniques
...Show More Authors
Abstract<p>The major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R<sup>2</sup>) is 0.077 m observed in Northing. While in</p> ... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Advanced Computer Science And Applications
Automatic Approach for Word Sense Disambiguation Using Genetic Algorithms
...Show More Authors

Abstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col

... Show More
View Publication Preview PDF
Crossref (3)
Crossref