Preferred Language
Articles
/
ijcpe-995
2D and 3D Modeling of Rock Mechanical Properties of Khasib Formation in East Baghdad Oil Field
...Show More Authors

Knowing the distribution of the mechanical rock properties and the far field stresses for the field of interest is an important task for many applications concerning reservoir geomechanics, including wellbore instability analysis, hydraulic fracturing, sand production, reservoir compaction, and subsidence. A major challenge with determining the rock's mechanical properties is that they cannot be directly measured at the borehole. Furthermore, the recovered carbonate core samples for performing measurements are limited and they provide discrete data for specific depths.

   The purpose of this study is to build 2D and 3D geomechanical models of the Khasib reservoir in the East Baghdad oil field/ Central area. TECHLOG.2015.3 software was used to build the 1D-MEM while Petrel E&P 2018.2 software was used to build the 3D distributions of rock mechanical properties. The Khasib formation has nine units (from K1 to K9). The current results support the evidence that the horizontal stresses are somewhat similar for all layers in the vertical case, but their distribution varies horizontally due to the changes in pore pressures. The pore pressure increases vertically, but its distribution within one layer is different due to the production from different wells. Elastic and strength characteristics of rock, including Young modulus, Poisson ratio, and unconfined compressive strength (UCS), have the same behavior, the highest value of the parameters appeared in the surface layer (K1). This layer is more stiff than other layers that have high porosities and high permeability. The internal friction angle for all formations ranges between 38o-40o, which gives a good harmonization with the limestone friction angle. The 3D distribution of the rock's mechanical properties revealed the carbonate heterogeneity because of its marine depositional environment and complex diagenetic processes. The findings of this study can be used for future geomechanical applications in the East Baghdad oil field including wellbore stability analysis, fault reactivation, and CO2 sequestration.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Robust Two-Step Estimation and Approximation Local Polynomial Kernel For Time-Varying Coefficient Model With Balance Longitudinal Data
...Show More Authors

      In this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of  specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Four Women: The E. Cassirer’s Theory and Its Analytical Potential for Understanding Iraqi Symbolic Painting by J. Saleem
...Show More Authors

Based on the theoretical ideas of E. Cassirer, a methodology is developed and an analysis of the painting work by J. Saleem, a representative of modern Iraqi painting, is carried out. While comparing the artistic programme of J. Saleem and the views of E. Cassirer, the methodological potential of the theory of the symbol for the art criticism analysis of the regional painting is clarified. Comparative analysis with the inclusion of the works of B. Buffet, B. Turetsky, J. Miro helps to see the multiple meanings of the same cultural symbol in thematically similar works of different years, created in different socio-cultural circumstances. The article shows that for regions with a shorter history (France, Russia, Spain, etc.), which have lo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 05 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Image Compression Based on Cubic Bezier Interpolation, Wavelet Transform, Polynomial Approximation, Quadtree Coding and High Order Shift Encoding
...Show More Authors

In this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Thinking skills and its Relationship to Some Variables to Four Grade Primary School Pupils with Slow Learning Abilities
...Show More Authors

The problem of slow learning in primary schools’ pupils is not a local or private one. It is also not related to a certain society other than others or has any relation to a particular culture, it is rather an international problem of global nature. It is one of the well-recognized issues in education field. Additionally, it is regarded as one of the old difficulties to which ancient people gave attention. It is discovered through the process of observing human behaviour and attempting to explain and predict it.
Through the work of the two researchers via frequent visits to primary schools that include special classes for slow learning pupils, in addition to the fact that one of the researcher has a child with slow learning issue, t

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
CALCULATION BIASES FOR COEFFICIENTS AND SCALE PARAMETER FOR LINEAR (TYPE 1) EXTREME VALUE REGRESSION MODEL FOR LARGEST VALUES
...Show More Authors

Abstract

Characterized by the Ordinary Least Squares (OLS) on Maximum Likelihood for the greatest possible way that the exact moments are known , which means that it can be found, while the other method they are unknown, but approximations to their biases correct to 0(n-1) can be obtained by standard methods. In our research expressions for approximations to the biases of the ML estimators (the regression coefficients and scale parameter) for linear (type 1) Extreme Value Regression Model for Largest Values are presented by using the advanced approach depends on finding the first derivative, second and third.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
Ibn Al Anbari grammatical inferences On   Abu Hatim al-Sijistani through his book Clarify the stay and start
...Show More Authors

Ibn al-Anbari, however, turned to Abu Hatim al-Sijistani in eleven places of his book ((clarify the endowment and start)). The study showed that the right and right was with the son of Anbari and that what went to Sistani saying uniqueness, and contrary to the vast majority of scientists. The study also showed that the science of grammar affects the endowment and initiation, as the study showed that the science of endowment and initiation is one of the important sciences of the Koran, which must be carefully received, researchers.

View Publication Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Rawal Medical Journal
Elevated lactate dehydrogenase (LDH) and C- reactive protein (CRP) level as a risk factor for critical COVID-19
...Show More Authors

Abstract Objective: To identify correlation of elevated LDH & CRP levels with the outcomes of COVID-19. Methodology: The cross-sectional retrospective study consisted of 200 COVID-19 patients who presented at a private clinical in Baghdad, Iraq. It was carried out from February 2021 to February 2022. Data included age, gender and clinical presentation. Blood samples were taken for high sensitivity CRP and LDH in the serum. Results: Out of 200 patients, 50 were critical and 150 severe according to clinical features. LDH and CRP showed a significant increase (p=0.000) in critical patients. This group involved admission to the respiratory intensive care unit requiring mechanical ventilation than in patients with severe COVID-19 (760.5±6.3 vs.

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Branch and Bound Algorithm with Penalty Function Method for solving Non-linear Bi-level programming with application
...Show More Authors

The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.

View Publication
Crossref
Publication Date
Thu Oct 25 2018
Journal Name
Journal Of Optical Communications
320 Gbps Free Space Optic Communication System Deploying Ultra Dense Wavelength Division Multiplexing and Polarization Mode Division Multiplexing
...Show More Authors
Abstract<p>This work aims to investigate the integrated ultra-dense wavelength division multiplexing (UDWDM) and polarization division multiplexing (PDM) schemes incorporated in the free space optic (FSO) communication system. Erbium-doped fiber amplifiers (EDFAs) are used as post and pre-amplifiers in the proposed UDWDM–PDM–FSO system to boost the transmission power for increasing the distance. Thirty-two channels are transported over the FSO link to realize the total data transmission of 160 and 320 Gbps with 0.08 and 0.1 nm channel spacing, respectively. Results are also reported with non-return to zero modulation schemes. The performance of the proposed UDWDM–PDM–FSO transmission sys</p> ... Show More
View Publication
Scopus (10)
Crossref (8)
Scopus Crossref