Preferred Language
Articles
/
joe-966
Petrophysical Analysis of an Iraqi Gas Field (Mansuriya Gas Field)
...Show More Authors

Mansuriya Gas field is an elongated anticlinal structure aligned from NW to SE, about 25 km long and 5-6 km wide. Jeribe formation is considered the main reservoir where it contains condensate fluid and has a uniform thickness of about 60 m. The reservoir is significantly over-pressured, (TPOC, 2014).

This research is about well logs analysis, which involves the determination of Archie petrophysical parameters, water saturation, porosity, permeability and lithology. The interpretations and cross plots are done using Interactive Petrophysics (IP) V3.5 software.

The rock parameters (a, m and n) values are important in determining the water saturation where (m) can be calculated by plotting the porosity from core and the formation factor from core on logarithmic scale for both and the slope which represent (m) then Pickett plot method is used to determine the other parameters after calculating Rw from water analysis .

The Matrix Identification (MID), M-N and Density-Neutron crossplots indicates that the lithology of Jeribe Formation consists of dolomite, limestone with some anhydrite also gas-trend is clear in the Jeribe Formation.

The main reservoir, Jeribe Formation carbonate, is subdivided into 8 zones namely  J1 to J8, based mainly on porosity log (RHOB and NPHI) trend, DT trend and saturation trend.

 Jeribe formation was considered to be clean in terms of shale content .The higher gamma ray because of the uranium component which is often associated with dolomitisationl and when it is removed and only comprises the thorium and potassium-40 contributions, showed the gamma response to be low compared to the total gamma ray response that also contains the uranium   contribution.While the Jeribe formation is considered to be clean in terms of shale content so the total porosity is equal to the effective porosity.No porosity cut off is found if cutoff permeability 0.01 md is applied while the porosity cut off approximately equal to 0.1 only for unit J6 & J8 if cutoff permeability 0.1 md is applied .

It can be concluded that no saturation cutoff for the units of Jeribe formation is found after a cross plot between water saturation and log porosity for the reservoir units of Jeribe formation and applied the calculated cut off porosity.

The permeability has been predicted using two methods: FZI and Classical, the two methods yield approximately the same results for all wells.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 10 2015
Journal Name
Al-academy
Functionalizing Location's Indications and Aesthetic Elements in Novel Film"(Pianist Film as an example): منير طه سلمان
...Show More Authors

Cinema artist work has not been achieved without location indications ; places are of cultured indications and its effect on behaviors and trends. Location is an important element as to convey meanings via its interaction with the personality about which it has been written may studies. Despite location occupies huge spaces within social and philosophical Drama branches , but it has a strong connection with the art world since it reflects reality of global theories in different fields. Audio and visual speech in Cinema have connected with the environmental effectiveness resulted from location which the sensual understanding interacts with in a way that suits Movie. Location consists of mixing elements of Movie and it in return interacts

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Journal Of Engineering
An Applying the Delphi Technique for Eliciting Criteria in Equipment and Materials Used in Highway Construction Projects
...Show More Authors

This article aims to establish and evaluate standards for critical equipment and materials in highway projects in Iraq. Delphi technique has been used to analyze, explore, and discover the main criteria and sub-criteria that affect equipment and materials in highway construction projects in Iraq. To determine the correct response to the criteria presented in this study, a program (IBM, SPSS/V25) was used to assess the main criteria and sub-criteria using the mean score (MS) and standard deviation (SD) technique, as well as to check reliability using Cronbach's alpha factor (α). The experts' qualifications and the extent to which the person is ready to commit are both important factors in panel selection. The design of a

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Formulate a strategy to manage tax compliance risks: An applied research in the General commission for Taxes
...Show More Authors

  This research discussed and analyzed the formulation of a strategy to manage tax compliance risks, as an applied research in the General commission for Taxes. The questionnaire was used as a research tool to identify the factors that stimulate or retard the research sample from being compliant. The K-means clustering method was also used to enable the classification of the research sample's views into four behaviors, some of these views pose tax-compliance risks. The research concluded that risk management is a continuous process and that all departments of the General commission for Taxes are responsible for its implementation to enable them to deal with the behavior of the taxpayer towards tax compliance. And it recommended

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using Tools Lean Accounting to Reduce the Costing: An Applied Research in General Company for Electric Industry
...Show More Authors

The developments accelerated in technology and rapid changes in the environment and increase numbers industrial countries and different desires and requirements of customers, lead to be produced in large quantities is not feasible due to changes listed above as well as the need to product variety and change in tastes and desires of consumers, all above led not to enable companies to discharge their products in the case of mass production and created the need to devise ways and new methods fit with the current situation, and accounting point no longer the traditional accounting systems able to meet the requirements needed by the companies to make decisions and know where waste and loss of resources resulting to invent new style away from

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Appropriate for Use Under Advanced Manu Facturing Technology: An Application in Baghdad Soft Drinks Company " Private Contribution
...Show More Authors

Big developments in technology have led to upset the balance of ideas, given of its own post new properties for products not provided by traditional technology, especially economic units operating within the industrial sector, and therefore it is important to develop the Iraqi industrial sector and interest to do its vital role in light Of progress technological.The research aims to Find the use of advanced manufacturing technologies that lead to customized production and quality appropriate whether they are low quality and low cost or low cost and suitable quality or high quality and high cost to win customer satisfaction.While the important conclusions is that the application of advanced manufacturing technology is not limited to techn

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Decent Work Impact in Enhancing Job Immersion/ An Applied Research in Labour and Vocational Training Directorate
...Show More Authors

The research aims to identify decent work and its impact in enhancing job immersion. The questionnaire was adopted as a tool to analyze the sample responses of (81) workers to represent an estimated response rate of (88 per cent) out of the total population of (92) individuals. The research adopted descriptive-analytical approach, and reliability calculation, arithmetic means standard deviations, relative importance, and regression analysis adopted on SPSS v.25. The conclusion shows that there is a medium correlation between decent work and job immersion, and there is a low impact of decent work with its dimensions in job immersion; extract the most important acceptable components for job from the sample point of view about the o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Empowerment and its impact in technical innovation Administrative An analytical study In General Company for electrical Industries
...Show More Authors

based search on two variables two main (Administrative empowerment ) and (technical innovation) target detection relationship and influence between the five dimensions (the delegation of authority , personnel training , effective communication, work teams , motivating employees) and
(technical innovation) conducted research in General Company for electrical Industries , and through the sample included the views of managers in the various administrative levels poll
.

And adopted a researcher at a major tool for data collection is questionnaire designed to find, as was the contents of the questionnaire analysis according to the Statistical Information System ( Spss), The (55) to identi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
A Unit Plan Based Upon The MI Theory: A theoretical study with an application Inside The Classroom
...Show More Authors

This research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref