Preferred Language
Articles
/
ijcpe-893
Permeability Prediction in One of Iraqi Carbonate Reservoir Using Statistical, Hydraulic Flow Units, and ANN Methods
...Show More Authors

   Permeability is an essential parameter in reservoir characterization because it is determined hydrocarbon flow patterns and volume, for this reason, the need for accurate and inexpensive methods for predicting permeability is important. Predictive models of permeability become more attractive as a result.

   A Mishrif reservoir in Iraq's southeast has been chosen, and the study is based on data from four wells that penetrate the Mishrif formation. This study discusses some methods for predicting permeability. The conventional method of developing a link between permeability and porosity is one of the strategies. The second technique uses flow units and a flow zone indicator (FZI) to predict the permeability of a rock mass using data from cores and well logs. The approach is used to predict the permeability of some uncored wells/intervals. The flow zone indicator is an efficient metric for calculating hydraulic flow units since it is based on the geological properties of the material and varied geometries pore of rock mass (HFU) and Artificial Neural Network (ANN) analysis is another way for predicting permeability. The result shows the FZI method, gave acceptable results compared with the obtained from core analysis than the other methods.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 25 2022
Journal Name
Al-mağallaẗ Al-šāmilaẗ Li-l-ḥuqūq
The intention to harm others is one of the forms of abuse of the right - a study in the light of American law
...Show More Authors

In a world of limited space, the owners are always surrounded by others next to them, and, consequently, there is hardly any activity which the owner may exercise on his land which would not affect the other owners. If he builds a building, that building may block the sun's rays or the air from the buildings next to it and owned by other people. And if he runs a business, the lands adjacent to that business may be overburdened with the accompanying noise or traffic. If oil is prospected in a land, the neighboring lands may be deprived of oil or their owners may be exposed to toxic fumes. Hence the importance of researching the intention of harming others, as it is one of the most important forms of abuse in the use of the right (especially

... Show More
View Publication
Publication Date
Wed Apr 06 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Management using the Six Sigma approach to cost rationalization of activities : Application in the Iraqi mechanical carpet factory
...Show More Authors

The textile industries play a prominent role in reviving the national economy, but they are currently suffering from several problems, including the high costs of their activities, the low quality of their production processes, and accordingly, the hexagonal diffraction approach came to help analyze production activities to determine which of them are the most expensive and do not have a benefit or cost greater than Its benefit as a result of waste and losses that accompany its implementation. And by applying to the Iraqi mechanical carpet factory, the research reached several conclusions, the most important of which is the presence of several sources of waste and loss, such as activities and operations that do not add value, whi

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Employment of the genetic algorithm in some methods of estimating survival function with application
...Show More Authors

Intended for getting good estimates with more accurate results, we must choose the appropriate method of estimation. Most of the equations in classical methods are linear equations and finding analytical solutions to such equations is very difficult. Some estimators are inefficient because of problems in solving these equations. In this paper, we will estimate the survival function of censored data by using one of the most important artificial intelligence algorithms that is called the genetic algorithm to get optimal estimates for parameters Weibull distribution with two parameters. This leads to optimal estimates of the survival function. The genetic algorithm is employed in the method of moment, the least squares method and the weighted

... Show More
Scopus (2)
Scopus
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Aesthetics third line of the Diversity of his methods in the architecture at Mosques
...Show More Authors

The Islamic Arts which include calligraphy and specifically the third line of the greatest
manifestation of Islamic civilization affair, and it was the mosques and mosques and holy
shrines scattered in the city of Baghdad, which had a deep impact in enhancing
communication
This means research study (third line aesthetics diversity of tactics in the architecture of
mosques) It is located in four seasons, which included the first chapter the research problem
represented by asking the following - :
-What are the methods of implementation of the third line in the architecture of mosques ?
And reflected the importance of research in it represents a serious attempt to investigate the
diversity in the organization des

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Impact beyond the knowledge when students of the Faculty of education in teaching methods
...Show More Authors

Research aims to know the impact beyond the defined in the collection. The research community is the second school students at Baghdad University and a research sample (63) students, the number of experimental group (27) students and a control group (30) students.  The researcher was rewarded in variable lifetime for students and educational attainment and educational level of the parents and the educational level of mothers. The researcher has developed a test took the number of paragraphs (20).  A test was true after it has been submitted to the Group of arbitrators. The test was consistent with test method used and the reliability coefficient (0, 88). Either the statistical methods used by the researcher are: Pearson correla

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 01 2014
Journal Name
Structural Science, Crystal Engineering And Materials
Comparison of the structural motifs and packing arrangements of six novel derivatives and one polymorph of 2-(1-phenyl-1H-1,2,3-triazol-4-yl)pyridine
...Show More Authors

The crystal structures of a new polymorph and seven new derivatives of 2-(1-phenyl-1H-1,2,3-triazol-4-yl)pyridine have been characterized and examined along with three structures from the literature to identify trends in their intermolecular contact patterns and packing arrangements in order to develop an insight into the crystallization behaviour of this class of compound. Seven unique C-H...X contacts were identified in the structures and three of these are present in four or more structures, indicating that these are reliable supramolecular synthons. Analysis of the packing arrangements of the molecules using XPac identified two closely related supramolecular constructs that are present in eight of the 11 structures; in all cases, the st

... Show More
Preview PDF
Scopus (9)
Scopus
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
Comparative Evaluation of Roundabout Capacities Methods for Single-lane and Multi-lane Roundabout
...Show More Authors

A roundabout is a highway engineering concept meant to calm traffic, increase safety, reduce stop-and-go travel, reduce accidents and congestion, and decrease traffic delays. It is circular and facilitates one-way traffic flow around a central point. The first part of this study evaluated the principles and methods used to compare the capacity methods of roundabouts with different traffic conditions and geometric configurations. These methods include gap acceptance, empirical, and simulation software methods. Previous studies mentioned in this research used various methods and other new models developed by several researchers. However, this paper's main aim is to compare different roundabout capacity models for acceptabl

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Rationalization of Decision –Making and Performance evaluation methods through Employing Strategic Management Accounting
...Show More Authors

This research dealt with the process of reducing costs through some strategic methods of management accounting targeted cost analysis unassembled and Alkeisen, where he focused this research through his theory on a review of some administrative accounting strategic technologies, while the second practical side through the application of targeted cost analysis unassembled and Alkeisen, acquired Search importance of focusing on the decisions to cut costs, through the use of some administrative accounting strategic methods and this we can unassembled analysis, continuous improvement, and the cost of quality) when applied quality, "in light of this has been reached to a set of conclusions that the most important of the  company's relian

... Show More
View Publication
Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Bayes and Non-Bayes Estimation Methods for the Parameter of Maxwell-Boltzmann Distribution
...Show More Authors

In this paper, point estimation for parameter ? of Maxwell-Boltzmann distribution has been investigated by using simulation technique, to estimate the parameter by two sections methods; the first section includes Non-Bayesian estimation methods, such as (Maximum Likelihood estimator method, and Moment estimator method), while the second section includes standard Bayesian estimation method, using two different priors (Inverse Chi-Square and Jeffrey) such as (standard Bayes estimator, and Bayes estimator based on Jeffrey's prior). Comparisons among these methods were made by employing mean square error measure. Simulation technique for different sample sizes has been used to compare between these methods.

View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref