Preferred Language
Articles
/
ijs-10026
Building A 3D Geological model Using Petrel Software for Asmari Reservoir, South Eastern Iraq
...Show More Authors

Building a 3D geological model from field and subsurface data is a typical task in
geological studies involving natural resource evaluation and hazard assessment. In
this paper a 3D geological model for Asmari Reservoir in Fauqi oil field has been
built using petrel software. Asmari Reservoir belongs to (Oligocene- Lower
Miocene), it represents the second reservoir products after Mishrif Reservoir in Fauqi
field. Five wells namely FQ6, FQ7, FQ15, FQ20, FQ21 have been selected lying in
Missan governorate in order to build Structural and petrophysical (porosity and water
saturation) models represented by a 3D static geological model in three directions
.Structural model shows that Fauqi oil field represents un cylindrical anticlinal fold
which contains number of culminations at northern and southern parts separated by
depressions. After making zones for Asmari reservoir, which is divided into 4 zones
(Jeribe/ Euphrates and Kirkuk group which includes Upper Kirkuk, Buzurgan
member, Lower and Middle Kirkuk) , Layers are built for each zone of Asmari
reservoir depending on petrophysical properties. Petrophysical models (porosity and
water saturation) have been constructed for each zone of Asmari reservoir using
random function simulation algorithm. According to data analyses and the results
from modeling, the Upper Kirkuk zone which divided into five layers is a good
reservoir unit regarding its good petrophysical properties (high porosity and low water
saturation) with high presence of oil in economic quantities. Cross sections of porosity
model and water saturation model were built to illustrate the vertical and horizontal
distribution of petrophysical properties between wells of Fauqi oil field.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
paratexte in specialized literary journals : AL ADEEB AL IRAQI magazine is a model
...Show More Authors

Post-structural critical studies highlighted the importance of studying the texts surrounding the text as an important part in the process of receiving and understanding texts, and although this topic was dealt with by the ancient Arabs and Europeans, interest in it appeared clearly after the appearance of Gerard Genet's book (SEUILS), which separated it Text Thresholds. Or what he called paratexte, and dealt with them with interest as he reads them on books. With the development of semiotic studies, interest in paratexte studies began in a broader way and in various literary and non-literary texts, including journalistic texts. And since specialized magazines are one of the press releases that enjoy their privacy in terms of topics and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Sep 30 2020
Journal Name
College Of Islamic Sciences
The Breadth in the meaning of the "from Surah Maryam as a model.
...Show More Authors

 

Prepositions have a key function, which is to associate parts of a sentence, called letters In addition, it adds the meanings of the verbs to the names, ie reached by them, and called by the coffin characters Qualities..

          I chose to search for the meaning of the preposition "from" in Surat Maryam to know its meanings in terms of originality and expansion, so the title of the research (the meanings of preposition "from" in terms of originality and expansion in Surat Maryam model(

 

View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Apr 20 2011
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Chaos in a harvested prey-predator model with infectious disease in the prey
...Show More Authors

A harvested prey-predator model with infectious disease in preyis investigated. It is assumed that the predator feeds on the infected prey only according to Holling type-II functional response. The existence, uniqueness and boundedness of the solution of the model are investigated. The local stability analysis of the harvested prey-predator model is carried out. The necessary and sufficient conditions for the persistence of the model are also obtained. Finally, the global dynamics of this model is investigated analytically as well as numerically. It is observed that, the model have different types of dynamical behaviors including chaos.

View Publication Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimation of a Parallel Stress-strength Model Based on the Inverse Kumaraswamy Distribution
...Show More Authors

   

 The reliability of the stress-strength model attracted many statisticians for several years owing to its applicability in different and diverse parts such as engineering, quality control, and economics. In this paper, the system reliability estimation in the stress-strength model containing Kth parallel components will be offered by four types of shrinkage methods: constant Shrinkage Estimation Method, Shrinkage Function Estimator, Modified Thompson Type Shrinkage Estimator, Squared Shrinkage Estimator. The Monte Carlo simulation study is compared among proposed estimators using the mean squared error. The result analyses of the shrinkage estimation methods showed that the shrinkage functions estimator was the best since

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Journal Of Applied Mathematics
Order and Chaos in a Prey-Predator Model Incorporating Refuge, Disease, and Harvesting
...Show More Authors

In this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2011
Journal Name
International Journal Of Data Analysis Techniques And Strategies
A class of efficient and modified testimators for the mean of normal distribution using complete data
...Show More Authors

View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Advances In Computing
A New Abnormality Detection Approach for T1-Weighted Magnetic Resonance Imaging Brain Slices Using Three Planes
...Show More Authors

Generally, radiologists analyse the Magnetic Resonance Imaging (MRI) by visual inspection to detect and identify the presence of tumour or abnormal tissue in brain MR images. The huge number of such MR images makes this visual interpretation process, not only laborious and expensive but often erroneous. Furthermore, the human eye and brain sensitivity to elucidate such images gets reduced with the increase of number of cases, especially when only some slices contain information of the affected area. Therefore, an automated system for the analysis and classification of MR images is mandatory. In this paper, we propose a new method for abnormality detection from T1-Weighted MRI of human head scans using three planes, including axial plane, co

... Show More