Four subsurface sections and electrical, porosity logs, and gamma-ray logs of the Khasib Formation (age Late Turonian-Lower Coniacian) were studied to identify reservoir characteristics and to evaluate the reservoir properties of the Khasib reservoir units in the East Baghdad oilfield. The lithology of the formation is limestone throughout the whole sequence in all studied wells EB-83, EB-87, EB-92, and EB94. It is bounded conformably from the top by Tanuma Formation and has a conformable lower contact with Kifl Formation. The lower and upper boundaries of the formation were determined using well log analysis, and the formation was divided into three main rock units (Kh1, Kh2, and Kh3), depending on the porosity logs. The porosity was calculated using acoustic or sonic, neutron, and density logs. The effective porosity (average 0.0 - 0.32 %) is the predominant porosity in the formation and to less extent; the secondary porosity. The volume of shale is very low (average 0.0 - 0.13 %), indicating limestone is the main rock of the Khasib Formation. The study of the reservoir water (average 0.11- 1.0%) and hydrocarbon saturations (average 0.0 - 0.88 %) showed that the formation contains varying proportions and quantities of water and hydrocarbons suspended in the wall void, and hydrocarbons capable of being produced. The lithological study reflected that the predominant lithic formation is limestone. It was found that Kh 2 unit is the best oil reservoir unit in all selected wells in terms of porosity, water saturation, diagenesis processes, and microfacies analysis.
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the cov
... Show MoreThe present study investigated the use of pretreated fish bone (PTFB) as a new surface, natural waste and low-cost adsorbent for the adsorption of Methyl green (MG, as model toxic basic dye) from aqueous solutions. The functional groups and surface morphology of the untreated fish bone (FB) and pretreated fish bone were characterized using Fourier transform infrared (FTIR), scanning electron microscopy (SEM) and Energy dispersive X-ray spectroscopy (EDS),respectively. The effect of operating parameters including contact time, pH, adsorbent dose, temperature, and inorganic salt was evaluated. Langmuir, Freundlich and Temkin adsorption isotherm models were studied and the results showed that the adsorption of basic dye followed Freundlich iso
... Show MoreSurvival analysis is widely applied in data describing for the life time of item until the occurrence of an event of interest such as death or another event of understudy . The purpose of this paper is to use the dynamic approach in the deep learning neural network method, where in this method a dynamic neural network that suits the nature of discrete survival data and time varying effect. This neural network is based on the Levenberg-Marquardt (L-M) algorithm in training, and the method is called Proposed Dynamic Artificial Neural Network (PDANN). Then a comparison was made with another method that depends entirely on the Bayes methodology is called Maximum A Posterior (MAP) method. This method was carried out using numerical algorithms re
... Show MoreThe newly synthesized Schiff base ligand (E)-2-((2-phenylhydrazono)methyl)naphthalen-1-ol (phenyl hydrazine derivative), is allowed to react with each of the next mineral ion: Ni2+, Cu2+, Zn2+andCd2+successfully resulting to obtain new metal complexes with different geometric shape. The formation of Schiff base complexes and also the origin Schiff base is indicated using LC-Mass that manifest the obtained molar mass, FT-IR proved the occurrence of coordination through N of azobenzene and O of OH by observing the shifting in azomethines band and appearing of M-N and N-O bands. Moreover, we can also detect by such apparatus, the presence of aquatic water molecule inside the coordination sphere. UV-Vis spectra of all resultants reveale
... Show MoreWithin the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo
... Show More
In this work, a test room was built in Baghdad city, with (2*1.5*1.5) m3 in dimensions, while the solar chimneys (SC) were designed with aspect ratio (ar) bigger than 12. Test room was supplied by many solar collectors; vertical single side of air pass with ar equals 25, and tilted 45o double side of air passes with ar equals 50 for each pass, both collectors consist of flat thermal energy storage box collector (TESB) that covered by transparent clear acrylic sheet, third type of collector is array of evacuated tubular collectors with thermosyphon in 45o instelled in the bottom of TESB of vertical SC. The TESB was
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreDerivative spectrophotometry is one of the analytical chemistry techniques used
in the analysis and determination of chemicals and pharmaceuticals. This method is
characterized by simplicity, sensitivity and speed. Derivative of Spectra conducted
in several ways, including optical, electronic and mathematical. This operation
usually be done within spectrophotometer. The paper is based on form of a new
program. The program construction is written in Visual Basic language within
Microsoft Excel. The program is able to transform the first, second, third and fourth
derivatives of data and the return of these derivatives to zero order (normal plot).
The program was applied on experimental (trial) and reals values of su
Beyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio
... Show More