Preferred Language
Articles
/
ijs-9293
Subsurface 3D Prediction Porosity Model from Converted Seismic and Well Data Using Model Based Inversion Technique
...Show More Authors

Seismic inversion technique is applied to 3D seismic data to predict porosity property for carbonate Yamama Formation (Early Cretaceous) in an area located in southern Iraq. A workflow is designed to guide the manual procedure of inversion process. The inversion use a Model Based Inversion technique to convert 3D seismic data into 3D acoustic impedance depending on low frequency model and well data is the first step in the inversion with statistical control for each inversion stage. Then, training the 3D acoustic impedance volume, seismic data and porosity wells data with multi attribute transforms to find the best statistical attribute that is suitable to invert the point direct measurement of porosity from well to 3D porosity distributed volume. The final subsurface porosity model greatly improves the understanding of the distribution of porosity in the reservoir zones and showing the variations of porosity both vertically and laterally. The success of the prepared workflow encourage the transformation it automatically to run the same workflow faster for the areas that have the same characteristics of carbonate Yamama Formation.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Introduction and Investigation into Oil Well Logging Operations (Review)
...Show More Authors

ole in all sta

Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and flui

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Introduction and Investigation into Oil Well Logging Operations (Review)
...Show More Authors

ole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with

... Show More
View Publication
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Petroleum And Coal
Analyzing of Production Data Using Combination of empirical Methods and Advanced Analytical Techniques
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Advances In Science, Technology And Engineering Systems Journal
Bayes Classification and Entropy Discretization of Large Datasets using Multi-Resolution Data Aggregation
...Show More Authors

Big data analysis has important applications in many areas such as sensor networks and connected healthcare. High volume and velocity of big data bring many challenges to data analysis. One possible solution is to summarize the data and provides a manageable data structure to hold a scalable summarization of data for efficient and effective analysis. This research extends our previous work on developing an effective technique to create, organize, access, and maintain summarization of big data and develops algorithms for Bayes classification and entropy discretization of large data sets using the multi-resolution data summarization structure. Bayes classification and data discretization play essential roles in many learning algorithms such a

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Oct 28 2015
Journal Name
Journal Of Mathematics And System Science
Simulating Particle Swarm Optimization Algorithm to Estimate Likelihood Function of ARMA(1, 1) Model
...Show More Authors

Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Daniel's Model on the Achievement of Chemistry Among Fifth Grade Student
...Show More Authors

The aim of this research is to find out the influence of Daniel's model on the skills of the twenty-first century among the students of the scientific-fifth grade at the secondary and preparatory government morning schools for the academic year 2022- 2023. Two groups were chosen out of five groups for the fifth-scientific grade, one of which represents the experimental group that is taught by the Daniel model, and the other is the control group that is taught in the traditional method. The equivalence of the two research groups was verified with a set of variables. As for the research tool, a scale was developed by the researchers for the skills of the twenty-first century, in which they adopted the framework of the Partnership Organizat

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 31 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Prediction the widths of maxillary and mandibular canines and premolars from the widths of maxillary incisors and first molars (Iraqi study)
...Show More Authors

Background: This study aimed to use the combined mesio-distal crowns widths of maxillary incisors and first molars as predictors to the combined mesio-distal crowns widths of maxillary and mandibular canines and premolars. Materials and methods: The sample included 110 Iraqi Arab subjects with an age ranged between 17-25 years and class I skeletal and dental relations. The crown widths of maxillary teeth and mandibular canines and premolars were measured at the largest mesio-distal dimension on the study casts using digital electronic caliper with 0.01 mm sensitivity. Pearson’s correlation coefficient was used to determine the relation between the combined mesio-distal crowns widths of maxillary incisors and first molars and the combined

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Solution of Fuzzy Maximal Flow Problems of Vehicles in Province of Diwaniyah Using the Ranking Function for Fuzzy Linear Programming Model
...Show More Authors

Abstract

The traffic jams taking place in the cities of the Republic of Iraq in general and the province of Diwaniyah especially, causes return to the large numbers of the modern vehicles that have been imported in the last ten years and the lack of omission for old vehicles in the province, resulting in the accumulation of a large number of vehicles that exceed the capacity of the city's streets, all these reasons combined led to traffic congestion clear at the time of the beginning of work in the morning, So researchers chose local area network of the main roads of the province of Diwaniyah, which is considered the most important in terms of traffic congestion, it was identified  fuzzy numbers for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of some methods for estimating the parameters of the binary logistic regression model using the genetic algorithm with practical application
...Show More Authors

Abstract

   Suffering the human because of pressure normal life of exposure to several types of heart disease as a result of due to different factors. Therefore, and in order to find out the case of a death whether or not, are to be modeled using binary logistic regression model

    In this research used, one of the most important models of nonlinear regression models extensive use in the modeling of applications statistical, in terms of heart disease which is the binary logistic regression model. and then estimating the parameters of this model using the statistical estimation methods, another problem will be appears in estimating its parameters, as well as when the numbe

... Show More
View Publication Preview PDF
Crossref