Preferred Language
Articles
/
gxaIS4kBVTCNdQwCrohN
A Survey of Infill Well Location Optimization Techniques

The maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Following that, the research looked at a variety of different optimization strategies, and it demonstrated the limitations of each strategy as well as the scope of its application in order to achieve a suitable level of accuracy and simulation run time. In conclusion, this study presents an all-encompassing analysis of the well location optimization approaches that are applied in the petroleum engineering area, ranging from traditional methods to contemporary methods that make use of artificial intelligence.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Geological Journal
A Review of Historical Studies for Water Saturation Determination Techniques

Water saturation is the most significant characteristic for reservoir characterization in order to assess oil reserves; this paper reviewed the concepts and applications of both classic and new approaches to determine water saturation. so, this work guides the reader to realize and distinguish between various strategies to obtain an appropriate water saturation value from electrical logging in both resistivity and dielectric has been studied, and the most well-known models in clean and shaly formation have been demonstrated. The Nuclear Magnetic Resonance in conventional and nonconventional reservoirs has been reviewed and understood as the major feature of this approach to estimate Water Saturation based on T2 distribution. Artific

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Agricultural And Statistical Sciences
A COMPARISON BETWEEN SOME HIERARCHICAL CLUSTERING TECHNIQUES

In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.

Scopus (1)
Scopus
Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Well Log Analysis of Nahr Umr, Shuaiba and Zubair Formations in EB-4 well of East Baghdad Oil Field, Iraq, using Rock Physics Templates (RPTs)

RPT is a method used for classifying various lithologies and fluids from data of well logging or seismic inversion. Three Formations (Nahr Umr, Shuaiba, and Zubair Formations) were selected in the East Baghdad Oil field within well EB-4 to test the possibility of using this method. First, the interpretations of the well log and Density – Neutron cross plot were used for lithology identification, which showed that Nahr Umr and Zubair formations consist mainly of sandstone and shale, while the Shuaiba Formation consists of carbonate (dolomite and limestone). The study was also able to distinguish between the locations of hydrocarbon reservoirs using RPT. Finally, a polynomial equation was generated from the cross plot domain (AI versus V

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu May 31 2012
Journal Name
Al-khwarizmi Engineering Journal
An Experimental Study on the Effect of Shape and Location of Vortex Generators Ahead of a Heat Exchanger

An experimental study is carried out on the effect of vortex generators (Circular and square) on the flow and heat transfer at variable locations at (X = 0.5, 1.5, 2.5 cm) ahead of a heat exchanger with Reynolds number ranging from 62000< Re < 125000 and heat flux from 3000 ≤ q ≤ 8000 W/m2 .

In the experimental investigation, an apparatus is set up to measure the velocity and temperatures around the heat exchanger.                     

The results show that there is an effect for using vortex generators on heat transfer. Also, heat transfer depends on the shape and location. The circular is found t

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Threshold Current Density of Al0.1Ga0.9N/GaN Triple Quantum Well Laser

Semiconductor laser is used in processing many issues related to the scientific, military, medical, industrial and agricultural fields due to its unique properties such as coherence and high strength where GaN-based components are the most efficient in this field. Current technological developments mention to the strong connection of GaN with sustainable electronic and optoelectronic devices which have high-efficiency. The threshold current density of Al0.1Ga0.9N/GaN triple quantum well laser structure was investigated to determine best values of the parameters affecting the threshold current density that are well width, average thickness of active region, cavity length, reflectivity of cavity mirrors and optical confinement factor. The opt

... Show More
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
View Publication
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
A Proposal Algorithm to Solve Delay Constraint Least Cost Optimization Problem

Traditionally, path selection within routing is formulated as a shortest path optimization problem. The objective function for optimization could be any one variety of parameters such as number of hops, delay, cost...etc. The problem of least cost delay constraint routing is studied in this paper since delay constraint is very common requirement of many multimedia applications and cost minimization captures the need to
distribute the network. So an iterative algorithm is proposed in this paper to solve this problem. It is appeared from the results of applying this algorithm that it gave the optimal path (optimal solution) from among multiple feasible paths (feasible solutions).

Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Tue Nov 19 2024
Journal Name
Al–bahith Al–a'alami
Evaluation in the Kurdish Media Institutions (A Descriptive Study Survey)

The importance of evaluation depends on many institutions, whether governmental or private, including media institutions, rely on the list to evaluate the weight of things and appreciation, as well as judging things, achievements, and everything related to the institution is concerned. Because through evaluation, institutions can recognize weaknesses and strengths. It is also an effective tool for management review, through which the institution can review everything related to planning and decision-making, leadership, incentives and other administrative matters.

Therefore, this study attempts to shed light on the evaluation process, its basics and its importance in general and in the Kurdish media institutions as a model in part

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey on bio-signal analysis for human-robot interaction

<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e

... Show More
Scopus (3)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey of deepfakes in terms of deep learning and multimedia forensics

Artificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfakedetection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection

... Show More
Scopus (1)
Scopus Crossref
View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

Scopus Crossref
View Publication