The Compressional-wave (Vp) data are useful for reservoir exploration, drilling operations, stimulation, hydraulic fracturing employment, and development plans for a specific reservoir. Due to the different nature and behavior of the influencing parameters, more complex nonlinearity exists for Vp modeling purposes. In this study, a statistical relationship between compressional wave velocity and petrophysical parameters was developed from wireline log data for Jeribe formation in Fauqi oil field south Est Iraq, which is studied using single and multiple linear regressions. The model concentrated on predicting compressional wave velocity from petrophysical parameters and any pair of shear waves velocity, porosity, density, and fluid saturation in carbonate rocks. A strong linear correlation between P-wave velocity and S-wave velocity and between P-wave velocity and density rock was found. The resulting linear equations can be used to estimate P-wave velocity from the S-wave velocity in the case of both. The results of multiple regression analysis indicated that the density, porosity, water-saturated, and shear wave velocity (VS) are strongly related to Vp.
4 Blood Res 2018;53:314-319. Received on August 11, 2018 Revised on August 30, 2018 Accepted on August 30, 2018 Background Iron overload is a risk factor affecting all patients with thalassemia intermedia (TI). We aimed to determine whether there is a relationship of serum ferritin (SF) and alanine ami- notransferase (ALT) with liver iron concentration (LIC) determined by R2 magnetic reso- nance imaging (R2-MRI), to estimate the most relevant degree of iron overload and best time to chelate in patients with TI. Methods In this cross-sectional study, 119 patients with TI (mean age years) were randomly se- lected and compared with 120 patients who had a diagnosis of thalassemia major (TM). Correlations of LIC, as determined by R2-MRI, with SF
... Show MoreThe aim of the research is to find out the nature of the relationship between the interrelationships and the interrelationships between risk management strategies (avoiding danger, risk exposure, risk exhibition, preventive programs and activities to reduce risks) and the dangers of container transportation, as an independent variable in the dangers of container transportation as a dependent variable, the study started from the problem that the company suffers from The practical aspect of the study was applied at the National Insurance Corporation, and the researcher designed a diagram according to the study's schematic diagram. The study, and for the purpose of data and information related to that, it relied on the descriptive a
... Show MoreSultan Said bin Sultan bin Ahmed bin Said Al-Busaidi (1223-1273 AH / 1806-1856 AD) was able to rule Oman and Zanzibar in a unified Arab-African state during his reign. However, it was separated for several reasons. Thus, the study aims to clarify the efforts made by Sultan Said for annexing Zanzibar to Oman, establishing the Arab-African Sultanate, and shedding light on the role played by Britain in dividing the Arab-African Sultanate and separating Zanzibar from the Omani rule in (1275 AH-1861 AD). The study has adopted the historical descriptive analytical approach. The study has reached several conclusions, such as: The economic motivators were the most important factors that pushed Sultan Said to move his capital from Muscat to
... Show MoreMost of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreMultilayer reservoirs are currently modeled as a single zone system by averaging the reservoir parameters associated with each reservoir zone. However, this type of modeling is rarely accurate because a single zone system does not account for the fact that each zone's pressure decreases independently. Pressure drop for each zone has an effect on the total output and would result in inter-flow and the premature depletion of one of the zones. Understanding reservoir performance requires a precise estimation of each layer's permeability and skin factor. The Multilayer Transient Analysis is a well-testing technique designed to determine formation properties in more than one layer, and its effectiveness over the past two decades has been
... Show MoreThe purpose of this article is to introduce reverse engineering procedure (REP). It can achieved by developing an industrial mechanical product that had no design schemes throughout the 3D-Scanners. The aim of getting a geometric CAD model from 3D scanner is to present physical model. Generally, this used in specific applications, like commercial plan and manufacturing tasks. Having a digital data as stereolithography (STL) format. Converting the point cloud be can developed as a work in programming by producing triangles between focuses, a procedure known as triangulation. Then it could be easy to manufacture parts unknown documentation and transferred the information to CNC-machines. In this work, modification was proposed and used in RE
... Show More
