Preferred Language
Articles
/
1hYOG4cBVTCNdQwCazfN
Reservoir Model and Production Strategy of Mishrif Reservoir-Nasryia Oil Field Southern Iraq
...Show More Authors

Nasryia oil field is located about 38 Km to the north-west of Nasryia city. The field was discovered in 1975 after doing seismic by Iraqi national oil company. Mishrif formation is a carbonate rock (Limestone and Dolomite) and its thickness reach to 170m. The main reservoir is the lower Mishrif (MB) layer which has medium permeability (3.5-100) md and good porosity (10-25) %. Form well logging interpretation, it has been confirmed the rock type of Mishrif formation as carbonate rock. A ten meter shale layer is separating the MA from MB layer. Environmental corrections had been applied on well logs to use the corrected one in the analysis. The combination of Neutron-Density porosity has been chosen for interpretation as it is close to core porosity. Archie equation had been used to calculate water saturation using corrected porosity from shale effect and Archie parameters which are determined using Picket plot. Using core analysis with log data lead to establish equations to estimate permeability and porosity for non-cored wells. Water saturation form Archie was used to determine the oil-water contact which is very important in oil in place calculation. PVT software was used to choose the best fit PVT correlation that describes reservoir PVT properties which will be used in reservoir and well modeling. Numerical software was used to generate reservoir model using all geological and petrophysical properties. Using production data to do history matching and determine the aquifer affect as weak water drive. Reservoir model calculate 6.9 MMMSTB of oil as initial oil in place, this value is very close to that measured by Chevron study on same reservoir which was 7.1 MMMSTB. [1] Field production strategy had been applied to predict the reservoir behavior and production rate for 34 years. The development strategy used water injection to support reservoir pressure and to improve oil recovery. The result shows that the reservoir has the ability to produce oil at apparently stable rate equal to 85 Kbbl/d, also the recovery factor is about 14%.

Crossref
View Publication
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Forgiveness level among gifted students and its relation to self-awareness
...Show More Authors

This study aims to identify the forgiveness level among gifted students and its relation to the self-awareness. The study sample consisted of (207) students were randomly chosen, they are integrated in secondary schools in Abha / Saudi Arabia. The correlative, analytical descriptive method was adopted. Two scales were adopted by the researcher: The forgiveness scale prepared by Rye et al (2001) which translated to Arabic by Al-Mahasneh (2017) and the self-awareness scale which prepared by Al-Ghezwani (2017). The study results indicated the following: the forgiveness level among the talented students was high, the self-awareness level among talented students was high, and there is a positive statistically significant relationship

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
Emotional Intelligence and its Relationship with Psychological Depression among University Students
...Show More Authors

The psychological scientific studies suggest that basic human situations stem from human emotional abilities and those with a lack of emotional intelligence are unable to cope with life, which might lead to anxiety and psychological depression. The current study aimed to investigate this problem by identifying the level of emotional intelligence and psychological depression among the students of the University of Anbar. To achieve the objectives of the study, the researchers created two questionnaires: 1) to measure emotional intelligence. 2) to measure psychological depression and applied these questionnaires on (300) students. The results revealed that the participants showed a high level of emotional intelligence with a low level of p

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 16 2024
Journal Name
International Journal Of Analysis And Applications
Fear and Hunting Cooperation's Impact on the Eco-Epidemiological Model's Dynamics
...Show More Authors

Due to the fact that living organisms do not exist individually, but rather exist in clusters interacting with each other, which helps to spread epidemics among them. Therefore, the study of the prey-predator system in the presence of an infectious disease is an important topic because the disease affects the system's dynamics and its existence. The presence of the hunting cooperation characteristic and the induced fear in the prey community impairs the growth rate of the prey and therefore affects the presence of the predator as well. Therefore, this research is interested in studying an eco-epidemiological system that includes the above factors. Therefore, an eco-epidemiological prey-predator model incorporating predation fear and

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Modeling and optimum design band pass filter for mid IR region
...Show More Authors

In this study, we design narrow band pass filter for window (3_5) ?m dependent on the needle optimization method , and a comparison with global designs published -Also, the effect of change parameter design on the optical performance of filter was studded and being able to overcome the difficulties of the design.In this study, the adoption of homogeneous optical properties materials as thin film depositing on a substrate of germanium at wavelength design (? = 4 ?m). For design this kind of filters we used advanced computer program (Matlab )to build a model design dependent both matrix characteristic and Needle technique. In this paper we refer to the type of Mert function , which is used for correct optical performance acces

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Poetics transformation and structure in the film: علاءالدين عبد المجيد جاسم
...Show More Authors

is divided into two chapter:Chapter one to ensure asyslematic framework for research amd included aresearch problem and also inchuded on the importance of research and the need for him as well as to clarify. The second chapter inchuded a theoretical framework: theoretical framework has been divided into two section. The first topic: poetics transformations The second topic: poetics and scale of rheloric in the film After the comp of the theoretical framework; so the researcher analyzed the film (Antichrist) has arrived ataset of resuits was including

 

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Theoretical And Applied Information Technology
A Survey on the Vein Biometric Recognition Systems: Trends and Challenges
...Show More Authors

Vascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Sun Dec 02 2018
Journal Name
Journal Of The College Of Education For Women
Political Thought in Russia During the 21st Century, Targets and Features
...Show More Authors

The features of strategic thought transformation in Russia based on attempt confirm the Russian influenced on Region of Eastern Europe through series of common defense treaties and mutual security between USSR and another states this treaties emphasis size on direct Russian supervision on these states in addition, Russia in trusted to formation communism regimes in its vital space, Russia inherited the status of former USSR in political and economic levels.

           Shortly we can see that Russia witnessed large Transformation in political strategic thought as a result of change in internal strategic environment and change of nature understanding which influenced on Russia. This

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 27 2020
Journal Name
Water
Groundwater Flow-Modeling and Sensitivity Analysis in a Hyper Arid Region
...Show More Authors

Groundwater modelling is particularly challenging in arid regions where limited water recharge is available. A fault zone will add a significant challenge to the modelling process. The Western Desert in Iraq has been chosen to implement the modelling concept and calculate the model sensitivity to the changes in aquifer hydraulic properties and calibration by researching 102 observations and irrigation wells. MODFLOW-NWT, which is a Newtonian formulation for MODFLOW-2005 approaches, have been used in this study. Further, the simulation run has been implemented using the Upstream-Weighting package (UPW) to treat the dry cells. The results show sensitivity to the change of the Kx value for the major groundwater discharge flow. Only abo

... Show More
View Publication
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref