Preferred Language
Articles
/
FYavRIYBIXToZYAL0IGk
Development of 1D-Synthetic Geomechanical Well Logs for Applications Related to Reservoir Geomechanics in Buzurgan Oil Field
...Show More Authors

Knowledge of the distribution of the rock mechanical properties along the depth of the wells is an important task for many applications related to reservoir geomechanics. Such these applications are wellbore stability analysis, hydraulic fracturing, reservoir compaction and subsidence, sand production, and fault reactivation. A major challenge with determining the rock mechanical properties is that they are not directly measured at the wellbore. They can be only sampled at well location using rock testing. Furthermore, the core analysis provides discrete data measurements for specific depth as well as it is often available only for a few wells in a field of interest. This study presents a methodology to generate synthetic-geomechanical well logs for the production section of the Buzurgan oil field, located in the south of Iraq, using an artificial neural network. An issue with the area of study is that shear wave velocities and pore pressure measurements in some wells are missing or incomplete possibly for cost and time-saving purposes. The unavailability of these data can potentially create inaccuracies in reservoir characterization n and production management. To overcome these challenges, this study presents two developed models for estimating the shear wave velocity and pore pressure using ANN techniques. The input parameters are conventional well logs including compressional wave, bulk density, and gamma-ray. Also, this study presents a construction of 1-D mechanical earth model for the production section of Buzurgan oil field which can be used for optimizing the selected mud weights with less wellbore problems (less nonproductive time. The results showed that artificial neural network is a powerful tool in determining the shear wave velocity and formation pore pressure using conventional well logs. The constructed 1D MEM revealed a high matching between the predicted wellbore instabilities and the actual wellbore failures that were observed by the caliper log. The majority of borehole enlargements can be attributed to the formation shear failures due to an inadequate selection of mud weights while drilling. Hence, this study presents optimum mud weights (1.3 to 1.35 g/cc) that can be used to drill new wells in the Buzurgan oil field with less expected drilling problems.

Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The impact of Innovation in offering the banking services in achieving competitive advantage for banks ( An applied study in the Iraqi private Banks )
...Show More Authors

     This research aims at recognizing the concept of Innovation in offering the banking services as well as the concept and dimensions of competitive advantage . And to identify and analyze the relationship ( correlation and impact ) between the concept of Innovation in  offering the banking services and the dimensions of the competitive advantage under discussion . The research includes all Iraqi private banks in Baghdad city only of the (20) banks . The researcher adopted , in this study , a random sample of the distribution of the questionnaire to members of the research sample are managers , customers and employees in these banks , and were distributed ( 115 ) form  questionnaire , ( 97 ) form w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of Shear Wave velocity for carbonate rocks
...Show More Authors

In many oil fields only the BHC logs (borehole compensated sonic tool) are available to provide interval transit time (Δtp), the reciprocal of compressional wave velocity VP.

   To calculate the rock elastic or inelastic properties, to detect gas-bearing formations, the shear wave velocity VS is needed. Also VS is useful in fluid identification and matrix mineral identification.

   Because of the lack of wells with shear wave velocity data, so many empirical models have been developed to predict the shear wave velocity from compressional wave velocity. Some are mathematical models others used the multiple regression method and neural network technique.

   In this study a number of em

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 17 2026
Journal Name
Journal Of Physical Education
Constructing and Standardizing Physical Tests for Speed Endurance In Youth Basketball
...Show More Authors

View Publication
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Emergency Medicine, Trauma And Acute Care
Histological variety analysis for pleomorphic adenoma in salivary glands: Retrospective study
...Show More Authors

Pleomorphic adenoma (PA) is the most frequent benign epithelial neoplasm of salivary glands, displaying a remarkable degree of morphological variety. The aim of the study is to illustrate the clinicopathological characteristics of PA with particular emphases on epithelial cell morphology and mesenchymal elements. Materials and Methods: A total of 132 PA collected between 2002 and 2017 were recruited from Al Shahid Ghazi Al Hariri Hospital and the Department of Oral Pathology, College of Dentistry, Baghdad University, Baghdad, Iraq, and analyzed for their demographic and histopathological features. All data were analyzed using descriptive statistics. A slightly higher incidence of PA was detected in females (52.3%) compared to male subject

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Nov 01 2012
Journal Name
Journal Of Computer Science
VOICE ACTIVATION VISUALIZATION FOR ECHOCARDIOGRAPH AND 3D ANGIOGRAPHIC IMAGES IN SURGERY
...Show More Authors

In some cases, surgeons need to navigate through the computer system for reconfirmation patients’ details and unfortunately surgeons unable to manage both computer system and operation at the same time. In this paper we propose a solution for this problem especially designed for heart surgeon, by introducing voice activation system with 3D visualization of Angiographic images, 2D visualization of Echocardiography processed video and selected patient’s details. In this study, the processing, approximation of the 3D angiography and the visualization of the 2D echocardiography video with voice recognition control are the most challenging work. The work involve with predicting 3D coronary three from 2D angiography image and also image enhan

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed May 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Chlorine concentration-time (C-T) plot for Echhornia Crassipes in water
...Show More Authors
Abstract<p>Eichhornia, or water hyacinth represents a serious threat to potable water basins. This problem is materialized majorly in consuming large amounts of water and dissolved Oxygen that is necessary for aquatic life, and minorly in hindering water streams. Even there are limited trials to overcome such pests, none of them presents an acceptable solution economically and logically. Chlorine is a well-known biocide and broadly used in water industry. It could give a possible method to fight such weed. To investigate that, concentration-time plot should be introduced similar to any other microorganisms; especially, bacteria in water. In this work, various doses of Chlorine along various time</p> ... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Advances In Informatics And Computing In Civil And Construction Engineering: Proceedings Of The 35th Cib W78 2018 Conference: It In Design, Construction, And Management
Technology alternatives for workplace safety risk mitigation in construction: Exploratory study
...Show More Authors

Publication Date
Sun Mar 03 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev

... Show More
View Publication
Scopus (21)
Crossref (11)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Physics: Conference Series
A Multilevel Approach for Stability Conditions in Fractional Time Diffusion Problems
...Show More Authors
Abstract<p>The Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which tr</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref