Preferred Language
Articles
/
ijs-7938
Reservoir Characteristics for Khasib Formation in selected wells of East Baghdad Oil field, Iraq
...Show More Authors

     Four subsurface sections and electrical, porosity logs, and gamma-ray logs of the Khasib Formation (age Late Turonian-Lower Coniacian) were studied to identify reservoir characteristics and to evaluate the reservoir properties of the Khasib reservoir units in the East Baghdad oilfield. The lithology of the formation is limestone throughout the whole sequence in all studied wells EB-83, EB-87, EB-92, and EB94. It is bounded conformably from the top by Tanuma Formation and has a conformable lower contact with Kifl Formation. The lower and upper boundaries of the formation were determined using well log analysis, and the formation was divided into three main rock units (Kh1, Kh2, and Kh3), depending on the porosity logs. The porosity was calculated using acoustic or sonic, neutron, and density logs. The effective porosity (average 0.0 - 0.32 %) is the predominant porosity in the formation and to less extent; the secondary porosity. The volume of shale is very low (average 0.0 - 0.13 %), indicating limestone is the main rock of the Khasib Formation. The study of the reservoir water (average 0.11- 1.0%) and hydrocarbon saturations (average 0.0 - 0.88 %) showed that the formation contains varying proportions and quantities of water and hydrocarbons suspended in the wall void, and hydrocarbons capable of being produced. The lithological study reflected that the predominant lithic formation is limestone. It was found that Kh 2 unit is the best oil reservoir unit in all selected wells in terms of porosity, water saturation, diagenesis processes, and microfacies analysis.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 01 2014
Journal Name
Iosr Journal Of Mathematics
Flow through an Oscillating Rectangular Duct for Generalized Oldroyd-B Fluid with Fractional Derivatives
...Show More Authors

The analytic solution for the unsteady flow of generalized Oldroyd- B fluid on oscillating rectangular duct is studied. In the absence of the frequency of oscillations, we obtain the problem for the flow of generalized Oldroyd- B fluid in a duct of rectangular cross- section moving parallel to its length. The problem is solved by applying the double finite Fourier sine and discrete Laplace transforms. The solutions for the generalized Maxwell fluids and the ordinary Maxwell fluid appear as limiting cases of the solutions obtained here. Finally, the effect of material parameters on the velocity profile spotlighted by means of the graphical illustrations

View Publication
Publication Date
Mon Oct 04 2021
Journal Name
Journal Of Petroleum Exploration And Production Technology
Perforation location optimization through 1-D mechanical earth model for high-pressure deep formations
...Show More Authors

Optimum perforation location selection is an important study to improve well production and hence in the reservoir development process, especially for unconventional high-pressure formations such as the formations under study. Reservoir geomechanics is one of the key factors to find optimal perforation location. This study aims to detect optimum perforation location by investigating the changes in geomechanical properties and wellbore stress for high-pressure formations and studying the difference in different stress type behaviors between normal and abnormal formations. The calculations are achieved by building one-dimensional mechanical earth model using the data of four deep abnormal wells located in Southern Iraqi oil fields. The magni

... Show More
Publication Date
Sat Jun 02 2018
Journal Name
American Academic Scientific Research Journal For Engineering, Technology, And Sciences
Girder Load Share for the Curved I-Girder Bridge Subjected to the Point Load
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
International Journal Of Statistics
Single and Double Stage Shrinkage Estimators for the Normal Mean with the Variance Cases
...Show More Authors

View Publication
Publication Date
Wed Jan 01 2014
Journal Name
International Journal Of Computer Applications
Enhancing the Delta Training Rule for a Single Layer Feedforward Heteroassociative Memory Neural Network
...Show More Authors

In this paper, an algorithm is suggested to train a single layer feedforward neural network to function as a heteroassociative memory. This algorithm enhances the ability of the memory to recall the stored patterns when partially described noisy inputs patterns are presented. The algorithm relies on adapting the standard delta rule by introducing new terms, first order term and second order term to it. Results show that the heteroassociative neural network trained with this algorithm perfectly recalls the desired stored pattern when 1.6% and 3.2% special partially described noisy inputs patterns are presented.

Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Physics: Conference Series
Study electron transport coefficients for Ar, O2 and their mixtures by using EEDF program
...Show More Authors

Publication Date
Thu Apr 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Pushing towards ehealth for iraqi hypertensives: an integrated class association rules into SECI model
...Show More Authors

<span lang="EN-GB">This paper highlights the barriers that have led to a delay in the implementation of E-Health services in Iraq. A new framework is proposed to improve the E-Health sector using a SECI model which describes how explicit and tacit knowledge is generated, transferred, and recreated in organizations through main stages (socialization, externalization, combination and internalization). Class association rules (CARs) is integrated to mine the SECI model by extracting related rules which correspond to the medical advice. The proposed framework (SECICAR) can be done through a web portal to assemble healthcare professionals, patients in one environment. SECICAR will be applied to the hypertension community to show th

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Sep 21 2013
Journal Name
Nonlinear Dynamics
BER performance enhancement for secure wireless optical communication systems based on chaotic MIMO techniques
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Solvability for Optimal Classical Continuous Control Problem Controlling by Quaternary Hyperbolic Boundary Value Problem
...Show More Authors

    This work is concerned with studying the solvability for optimal classical continuous control quaternary vector problem that controls by quaternary linear hyperbolic boundary value problem. The existence of the unique quaternary state vector solution for the quaternary linear hyperbolic boundary value problem  is studied and demonstrated by employing the method of Galerkin, where the classical continuous control quaternary vector  is Known. Also, the existence theorem of an optimal classical continuous control quaternary vector related to the quaternary linear hyperbolic boundary value problem is demonstrated. The existence of a unique solution to the adjoint quaternary linear hyperbolic boundary value problem a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Using Visual Cryptography and hash function for Fragile Watermarking to Detect Electronic Document Forgery
...Show More Authors

     Recent developments in technology and the area of digital communications have rendered digital images increasingly susceptible to tampering and alteration by persons who are not authorized to do so. This may appear to be acceptable, especially if an image editing process is necessary to delete or add a particular scene that improves the quality the image. But what about images used in authorized governmental transactions? The consequences can be severe; any altered document is considered forged under the law and may cause confusion. Also, any document that cannot be verified as being authentic is regarded as a fake and cannot be used, inflicting harm on people. The suggested work intends to reduce fraud in electronic documents u

... Show More
View Publication Preview PDF
Scopus Crossref