Preferred Language
Articles
/
joe-885
Geological Model of the Tight Reservoir (Sadi Reservoir-Southern of Iraq)
...Show More Authors

A3D geological model was constructed for Al-Sadi reservoir/ Halfaya Oil Field which is discovered in 1976 and located 35 km from Amara city, southern of Iraq towards the Iraqi/ Iranian borders.

Petrel 2014 was used to build the geological model. This model was created depending on the available information about the reservoir under study such as 2D seismic map, top and bottom of wells, geological data & well log analysis (CPI). However, the reservoir was sub-divided into 132x117x80 grid cells in the X, Y&Z directions respectively, in order to well represent the entire Al-Sadi reservoir.

Well log interpretation (CPI) and core data for the existing 6 wells were the basis of the petrophysical model (Porosity, Water saturation, & Permeability) that were distributed for all the created grids and then upscaled.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 20 2024
Journal Name
Bulletin Of The Iraq Natural History Museum
MORPHOLOGICAL CHARACTERIZATION OF BLOWFLY MAGGOTS (DIPTERA, CALLIPHORIDAE) FROM THE MIDDLE OF IRAQ
...Show More Authors

This study aimed to conduct a comparative analysis of seven calliphorid species of third- instar larvae that were collected from central Iraq. The purpose was to morphologically characterize these species and develop an identification key to differentiate them from closely related species. Scanning Electron Microscope (SEM) graphical images and high-resolution traditional optical microscopes were used to analyze the morphological characteristics of the species Calliphora vomitoria (Linnaeus, 1758), C. vicina Robineau-Desvoidy, 1830, Chrysomya albiceps (Widemann, 1819), Ch. rufifacies (Macquart, 1844), Ch. megacephala (Fabricius, 1794), Lucilia cuprina (Wiedemann, 1830), and L. sericata (Meigen, 1826). An identification key was const

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 31 2026
Journal Name
Nasaq
The Effectiveness of The Proposed Teaching strategy According to The Common Knowledge Construction Model in The Achievement of Students of The Second intermediate grade in Mathematics
...Show More Authors

View Publication
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Water Resource And Hydraulic Engineering (jwrhe)
Large Scale Field Physical Model Simulation of Roseires Dam-Break, Sudan
...Show More Authors

Physically based modeling approach has been widely developed in recent years for the simulation of dam failure process due to the lack of field data. This paper provides and describes a physically-based model depending on dimensional analysis and hydraulic simulation methods for estimating the maximum water level and the wave propagation time from breaching of field test dams. The field physical model has been constructed in Dabbah city to represent the collapse of the Roseires dam in Sudan. Five cases of a dam failure were studied to simulate water flood conditions by changing initial water height in the reservoir (0.8, 1.0, 1.2, 1.4 and 1.5 m respectively).The physical model working under five cases, case 5 had the greatest influence of t

... Show More
Publication Date
Sat Jun 01 2024
Journal Name
Pakistan Journal Of Criminology
Artificial Intelligence Technology in the Field of Modern Forensic Evidence: Brain Fingerprinting as a Model
...Show More Authors

Brain Fingerprinting (BF) is one of the modern technologies that rely on artificial intelligence in the field of criminal evidence law. Brain information can be obtained accurately and reliably in criminal procedures without resorting to complex and multiple procedures or questions. It is not embarrassing for a person or even violates his human dignity, as well as gives immediate and accurate results. BF is considered one of the advanced techniques related to neuroscientific evidence that relies heavily on artificial intelligence, through which it is possible to recognize whether the suspect or criminal has information about the crime or not. This is done through Magnetic Resonance Imaging (EEG) of the brain and examining

... Show More
View Publication
Publication Date
Mon Aug 01 2022
Journal Name
Journal Of Physics: Conference Series
The local bifurcation analysis of two preys stage-structured predator model with anti-predator behavior
...Show More Authors
Abstract<p>This paper deals with two preys and stage-structured predator model with anti-predator behavior. Sufficient conditions that ensure the appearance of local and Hopf bifurcation of the system have been achieved, and it’s observed that near the free predator, the free second prey and the free first prey equilibrium points there are transcritical or pitchfork and no saddle node. While near the coexistence equilibrium point there is transcritical, pitchfork and saddle node bifurcation. For the Hopf bifurcation near the coexistence equilibrium point have been studied. Further, numerical analysis has been used to validate the main results.</p>
View Publication
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Indian Journal Of Natural Sciences
Determination of the Electron Density Variation for Ionosphere Layer Over Iraqi Zone Using IRI Model
...Show More Authors

KA Hadi, AH Asma’a, IJONS, 2018 - Cited by 1

View Publication
Publication Date
Tue Dec 25 2018
Journal Name
Summaries Of Working Papers, Research And Experiments
E-learning at the College of Mass Communication, subject: public relations campaigns as a model
...Show More Authors

Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 01 2017
Journal Name
Energy Procedia
A Coupled Model of the Linear Joule Engine with Embedded Tubular Permanent Magnet Linear Alternator
...Show More Authors

Scopus (16)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Journal Of Physics: Conference Series
An Integrated Model of The Relation Between E-Service Quality and User Satisfaction in IHL
...Show More Authors
Abstract<p>Quality of e-service is one of the critical factors that decide the success or failure of organizations. It may increase competitive advantages as well as enhance the relationships with the customers. Achieving high e-service quality and user satisfaction are challenging since they depend fundamentally on user perception and expectation which can be tricky at times. To date, there is no agreement as to what service quality is, and how it should be measured, whether it is a function of statistical measures of quality including physical defects or managerial judgment, or it is a function of customer perception about the services. This paper deep-dived the quality of e-services offered b</p> ... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Crossref