Preferred Language
Articles
/
ijcpe-815
Digital Rock Samples Porosity Analysis by OTSU Thresholding Technique Using MATLAB
...Show More Authors

Porosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in resulting binary image. This paper presents the possibilities of using image processing for determining digital 2D rock samples porosity in carbonate reservoir rocks. MATLAB code created which automatically segment and determine the digital rock porosity, based on the OTSU's thresholding algorithm. In this work, twenty-two samples of 2D thin section petrographic image reservoir rocks of one Iraqi oil field are studied. The examples of thin section images are processed and digitized, utilizing MATLAB programming. In the present study, we have focused on determining of micro and macroporosity of the digital image. Also, some pore void characteristics, such as area and perimeter, were calculated. Digital 2D image analysis results are compared to laboratory core investigation results to determine the strength and restrictions of the digital image interpretation techniques. Thin microscopic image porosity determined using OTSU technique showed a moderate match with core porosity.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
2018 1st Annual International Conference On Information And Sciences (aicis)
Speech Emotion Recognition Using Minimum Extracted Features
...Show More Authors

Recognizing speech emotions is an important subject in pattern recognition. This work is about studying the effect of extracting the minimum possible number of features on the speech emotion recognition (SER) system. In this paper, three experiments performed to reach the best way that gives good accuracy. The first one extracting only three features: zero crossing rate (ZCR), mean, and standard deviation (SD) from emotional speech samples, the second one extracting only the first 12 Mel frequency cepstral coefficient (MFCC) features, and the last experiment applying feature fusion between the mentioned features. In all experiments, the features are classified using five types of classification techniques, which are the Random Forest (RF),

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Mar 07 2017
Journal Name
The First International Conference For Engineering Research
Colony Counting Using iPad and iPhone Applications
...Show More Authors

Publication Date
Wed Jan 01 2025
Journal Name
Lecture Notes In Networks And Systems
Diagnosis of Diabetes Using Artificial Intelligence Programs
...Show More Authors

Scientific development has occupied a prominent place in the field of diagnosis, far from traditional procedures. Scientific progress and the development of cities have imposed diseases that have spread due to this development, perhaps the most prominent of which is diabetes for accurate diagnosis without examining blood samples and using image analysis by comparing two images of the affected person for no less than a period. Less than ten years ago they used artificial intelligence programs to analyze and prove the validity of this study by collecting samples of infected people and healthy people using one of the Python program libraries, which is (Open-CV) specialized in measuring changes to the human face, through which we can infer the

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Oct 05 2019
Journal Name
Journal Of Engineering And Applied Sciences
Secure Image Steganography using Biorthogonal Wavelet Transform
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Engineering
REMOVAL OF HEAVY METALS USING REVERSE OSMOSIS
...Show More Authors

The aim of this work is to study reverse osmosis characteristics for copper sulfate hexahydrate (CuSO4.6H2O), nickel sulfate hexahydrate (NiSO4.6H2O) and zinc sulfate hexahydrate (ZnSO4.6H2O) removal from aqueous solution which discharge from some Iraqi factories such as Alnasser Company for mechanical industries. The mode of operation of reverse osmosis was permeate is removed and the concentrate of metals solution is recycled back to the feed vessel. Spiral-wound membrane is thin film composite membrane (TFC) was used to conduct this study on reverse osmosis. The variables studied are metals concentrations (50 – 150 ppm) and time (15 – 90 min). It was found that increasing the time results in an increase in concentration of metal in p

... Show More
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Data Mining, Modelling And Management
Association rules mining using cuckoo search algorithm
...Show More Authors

Association rules mining (ARM) is a fundamental and widely used data mining technique to achieve useful information about data. The traditional ARM algorithms are degrading computation efficiency by mining too many association rules which are not appropriate for a given user. Recent research in (ARM) is investigating the use of metaheuristic algorithms which are looking for only a subset of high-quality rules. In this paper, a modified discrete cuckoo search algorithm for association rules mining DCS-ARM is proposed for this purpose. The effectiveness of our algorithm is tested against a set of well-known transactional databases. Results indicate that the proposed algorithm outperforms the existing metaheuristic methods.

View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
GENERATION OF MPSK SIGNAL USING LOGIC CIRCUITS
...Show More Authors

The traditional technique of generating MPSK signals is basically to use IQ modulator that involves analog processing like multiplication and addition where inaccuracies may exist and would lead to imbalance problems that affects the output modulated signal and hence the overall performance of the system. In this paper, a simple method is presented for generating the MPSK using logic circuits that basically generated M-carrier signals each carrier of different equally spaced phase shift. Then these carriers are time multiplexed, according to the data symbols, into the output modulated signal.

View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression using Hierarchal Linear Polynomial Coding
...Show More Authors

Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Human Recognition Using Ear Features: A Review
...Show More Authors

Over the past few years, ear biometrics has attracted a lot of attention. It is a trusted biometric for the identification and recognition of humans due to its consistent shape and rich texture variation. The ear presents an attractive solution since it is visible, ear images are easily captured, and the ear structure remains relatively stable over time.  In this paper, a comprehensive review of prior research was conducted to establish the efficacy of utilizing ear features for individual identification through the employment of both manually-crafted features and deep-learning approaches. The objective of this model is to present the accuracy rate of person identification systems based on either manually-crafted features such as D

... Show More
View Publication
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s Law to detect Financial Fraud
...Show More Authors

Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.

View Publication Preview PDF
Crossref (1)
Crossref