The petrophysical analysis is very important to understand the factors controlling the reservoir quality and production wells. In the current study, the petrophysical evaluation was accomplished to hydrocarbon assessment based on well log data of four wells of Early Cretaceous carbonate reservoir Yamama Formation in Abu-Amood oil field in the southern part of Iraq. The available well logs such as sonic, density, neutron, gamma ray, SP, and resistivity logs for wells AAm-1, AAm-2, AAm-3, and AAm-5 were used to delineate the reservoir characteristics of the Yamama Formation. Lithologic and mineralogic studies were performed using porosity logs combination cross plots such as density vs. neutron cross plot and M-N mineralogy plot. These cross plots show that the Yamama Formation consists mainly of limestone and the essential mineral components are dominantly calcite with small amounts of dolomite. The petrophysical characteristics such as porosity, water and hydrocarbon saturation and bulk water volume were determined and interpreted using Techlog software to carried out and building the full computer processed interpretation for reservoir properties. Based on the petrophysical properties of studied wells, the Yamama Formation is divided into six units; (YB-1, YB-2, YB-3, YC-1, YC-2 and YC-3) separated by dense non porous units (Barrier beds). The units (YB-1, YB-2, YC-2 and YC-3) represent the most important reservoir units and oil-bearing zones because these reservoir units are characterized by good petrophysical properties due to high porosity and low to moderate water saturation. The other units are not reservoirs and not oil-bearing units due to low porosity and high-water saturation.
This research aims to predict new COVID-19 cases in Bandung, Indonesia. The system implemented two types of deep learning methods to predict this. They were the recurrent neural networks (RNN) and long-short-term memory (LSTM) algorithms. The data used in this study were the numbers of confirmed COVID-19 cases in Bandung from March 2020 to December 2020. Pre-processing of the data was carried out, namely data splitting and scaling, to get optimal results. During model training, the hyperparameter tuning stage was carried out on the sequence length and the number of layers. The results showed that RNN gave a better performance. The test used the RMSE, MAE, and R2 evaluation methods, with the best numbers being 0.66975075, 0.470
... Show MoreQuantum dots of CdSe, CdS and ZnS QDs were prepared by chemical reaction and used to fabricate organic quantum dot hybrid junction device. QD-LEDs were fabricated using layers of ITO/TPD: PMMA/CdSe/Alq3, ITO/TPD: PMMA/CdS/Alq3 and ITO/TPD: PMMA/ZnS/Alq3 devices which prepared by phase segregation method. The hybrid white light emitting devices consists, of three-layers deposited successively on the ITO glass substrate; the first layer was of N, N’-bis (3-methylphenyl)-N, N’-bis (phenyl) benzidine (TPD) polymer mixed with polymethyl methacrylate (PMMA) polymers. The second layer was QDs while the third layer was tris (8-hydroxyquinoline) aluminium (Alq3
... Show MoreIn this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.
Biomass has been extensively investigated, because of its presence as clean energy source. Tars and particulates formation problems are still the major challenges in development especially in the implementation of gasification technologies into nowadays energy supply systems. Laser Induced Fluorescence spectroscopy (LIF) method is incorporated for determining aromatic and Polycyclic Aromatic Hydrocarbons (PAH) produced at high temperature gasification technology. The effect of tars deposition when the gases are cooled has been highly reduced by introducing a new concept of measurement cell. The samples of PAH components have been prepared with the standard constrictions of measured PAHs by using gas chromatograph (GC). OPO laser with tun
... Show More<span lang="EN-US">The need for robotics systems has become an urgent necessity in various fields, especially in video surveillance and live broadcasting systems. The main goal of this work is to design and implement a rover robotic monitoring system based on raspberry pi 4 model B to control this overall system and display a live video by using a webcam (USB camera) as well as using you only look once algorithm-version five (YOLOv5) to detect, recognize and display objects in real-time. This deep learning algorithm is highly accurate and fast and is implemented by Python, OpenCV, PyTorch codes and the Context Object Detection Task (COCO) 2020 dataset. This robot can move in all directions and in different places especially in
... Show MoreThe accuracy of the Moment Method for imposing no-slip boundary conditions in the lattice Boltzmann algorithm is investigated numerically using lid-driven cavity flow. Boundary conditions are imposed directly upon the hydrodynamic moments of the lattice Boltzmann equations, rather than the distribution functions, to ensure the constraints are satisfied precisely at grid points. Both single and multiple relaxation time models are applied. The results are in excellent agreement with data obtained from state-of-the-art numerical methods and are shown to converge with second order accuracy in grid spacing.
Smishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreHigh frequency (HF) radio wave propagation depends on the ionosphere status which is changed with the time of day, season, and solar activity conditions. In this research, ionosonde observations were used to calculate the values of maximum usable frequency (MUF) the ionospheric F2- layer during strong geomagnetic storms (Dst ≤ -100 nT) which were compared with the predicted MUF for the same layer by using IRI-16 model. Data from years 2015 and 2017, during which five strong geomagnetic storms occurred, were selected from two Japanese ionosonde stations (Kokubunji and Wakkanai) located at the mid-latitude region. The results of the present work do not show a good correlation between the observed and predicted MUF values for F2- laye
... Show More