Preferred Language
Articles
/
ijs-9293
Subsurface 3D Prediction Porosity Model from Converted Seismic and Well Data Using Model Based Inversion Technique
...Show More Authors

Seismic inversion technique is applied to 3D seismic data to predict porosity property for carbonate Yamama Formation (Early Cretaceous) in an area located in southern Iraq. A workflow is designed to guide the manual procedure of inversion process. The inversion use a Model Based Inversion technique to convert 3D seismic data into 3D acoustic impedance depending on low frequency model and well data is the first step in the inversion with statistical control for each inversion stage. Then, training the 3D acoustic impedance volume, seismic data and porosity wells data with multi attribute transforms to find the best statistical attribute that is suitable to invert the point direct measurement of porosity from well to 3D porosity distributed volume. The final subsurface porosity model greatly improves the understanding of the distribution of porosity in the reservoir zones and showing the variations of porosity both vertically and laterally. The success of the prepared workflow encourage the transformation it automatically to run the same workflow faster for the areas that have the same characteristics of carbonate Yamama Formation.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 05 2010
Journal Name
Evolutionary Algorithms
Variants of Hybrid Genetic Algorithms for Optimizing Likelihood ARMA Model Function and Many of Problems
...Show More Authors

Optimization is essentially the art, science and mathematics of choosing the best among a given set of finite or infinite alternatives. Though currently optimization is an interdisciplinary subject cutting through the boundaries of mathematics, economics, engineering, natural sciences, and many other fields of human Endeavour it had its root in antiquity. In modern day language the problem mathematically is as follows - Among all closed curves of a given length find the one that closes maximum area. This is called the Isoperimetric problem. This problem is now mentioned in a regular fashion in any course in the Calculus of Variations. However, most problems of antiquity came from geometry and since there were no general methods to solve suc

... Show More
Preview PDF
Publication Date
Thu May 14 2020
Journal Name
Journal Of Planner And Development
Visual Pollution and its Impact on the Aesthetics: The Town of Eizariya as a Model
...Show More Authors

This study seeks to shed light on the aspects of visual pollution and its impact on the aesthetics of the town of Al-Eizariya known to suffer from the phenomenon. In order to identify the real causes of the problem which develops in various forms and patterns, threatening not only the aesthetic appearance of the towns, but also causes the emergence of new problems and phenomena that will have negative repercussions on the population. The researcher uses the analytical descriptive method to analyze the phenomenon of visual pollution in terms of reality, development, manifestations and spread and uses photos which document the visual pollution and its impact on the aesthetics of the known. The study concluded the existence of a strong rela

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Evergreen
Development, Validation, and Performance Evaluation of An Air-Driven Free-Piston Linear Expander Numerical Model
...Show More Authors

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Stability Analysis of a Prey-Predator Model with Prey Refuge and Fear of Adult Predator
...Show More Authors

     This paper is concerned with a Holling-II stage-structured predator-prey system in which predators are divided into an immature and mature predators. The aim is to explore the impact of the prey's fear caused by the dread of mature predators in a prey-predator model including intraspecific competitions and prey shelters. The theoretical study includes the local and global stability analysis for the three equilibrium points of the system and shows the prey's fear may lead to improving the stability at the positive equilibrium point. A numerical analysis is given to ensure the accuracy of the theoretical outcomes and to testify the conditions of stability of the system near the non-trivial equilibrium points.

View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
Mathematical Analysis of Peristaltic Pumps for Fene-P model subject to Hall and Joule impact
...Show More Authors

    A mathematical model is developed to discuss the impact of the Hall current and the Joule heating on the peristaltic flux of finitely extensible nonlinear elastic Peterlin (FENE-P) fluid in a tapered tube with mild stenosis. The fluid movement  along the wall surface resulted from the sinusoidal wave flowing with constant speed. Conditions of velocity and thermal slip are applied. Lubrication approximation is adopted to modify the governing flow problem. To discover the solution to a system of equations, the regular perturbation approach is used. The effects of the different physical parameters are debated and graphically shown in a set of figures. It is discovered that as the Hall current parameter is increased and the Hartman n

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 14 2023
Journal Name
Malaysian Journal Of Mathematical Sciences
The Effect of Alternative Resource and Refuge on the Dynamical Behavior of Food Chain Model
...Show More Authors

This article examines and proposes a dietary chain model with a prey shelter and alternative food sources. It is anticipated that mid-predators' availability is positively correlated with the number of refuges. The solution's existence and exclusivity are examined. It is established that the solution is bounded. It is explored whether all potential equilibrium points exist and are locally stable. The Lyapunov approach is used to investigate the equilibrium points' worldwide stability. Utilizing a Sotomayor theorem application, local bifurcation is studied. Numerical simulation is used to better comprehend the dynamics of the model and define the control set of parameters.

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Smart Irrigation Technique in the Fixed Irrigation System Based on Soil Moisture Content
...Show More Authors
Abstract<p>The growing water demand has raised serious concerns about the future of irrigated agriculture in many parts all over the world, changing environmental conditions and shortage of water (especially in Iraq) have led to the need for a new system that efficiently manages the irrigation of crops. With the increasing population growing at a rapid pace, traditional agriculture will have a tough time meeting future food demands. Water availability and conservation are major concerns for farmers. The configuration of the smart irrigation system was designed based on data specific to the parameters concerning the characteristics of the plant and the properties of soil which are measured once i</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Multi-Objective Genetic Algorithm-Based Technique for Achieving Low-Power VLSI Circuit Partition
...Show More Authors

     Minimizing the power consumption of electronic systems is one of the most critical concerns in the design of integrated circuits for very large-scale integration (VLSI). Despite the reality that VLSI design is known for its compact size, low power, low price, excellent dependability, and high functionality, the design stage remains difficult to improve in terms of time and power. Several optimization algorithms have been designed to tackle the present issues in VLSI design. This study discusses a bi-objective optimization technique for circuit partitioning based on a genetic algorithm. The motivation for the proposed research is derived from the basic concept that, if some portions of a circuit's system are deactivated during th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 06 2013
Journal Name
Robotica
Function approximation technique-based adaptive virtual decomposition control for a serial-chain manipulator
...Show More Authors
SUMMARY<p>The virtual decomposition control (VDC) is an efficient tool suitable to deal with the full-dynamics-based control problem of complex robots. However, the regressor-based adaptive control used by VDC to control every subsystem and to estimate the unknown parameters demands specific knowledge about the system physics. Therefore, in this paper, we focus on reorganizing the equation of the VDC for a serial chain manipulator using the adaptive function approximation technique (FAT) without needing specific system physics. The dynamic matrices of the dynamic equation of every subsystem (e.g. link and joint) are approximated by orthogonal functions due to the minimum approximation errors produced. The contr</p> ... Show More
View Publication
Scopus (26)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref