Characterization of the heterogonous reservoir is complex representation and evaluation of petrophysical properties and application of the relationships between porosity-permeability within the framework of hydraulic flow units is used to estimate permeability in un-cored wells. Techniques of flow unit or hydraulic flow unit (HFU) divided the reservoir into zones laterally and vertically which can be managed and control fluid flow within flow unit and considerably is entirely different with other flow units through reservoir. Each flow unit can be distinguished by applying the relationships of flow zone indicator (FZI) method. Supporting the relationship between porosity and permeability by using flow zone indictor is carried out for evaluating the reservoir quality and identification of flow unit used in reservoir zonation. In this study, flow zone indicator has been used to identify five layers belonging to Tertiary reservoirs. Consequently, the porosity-permeability cross plot has been done depending on FZI values as groups and for each group denoted to reservoir rock types. On the other hand, extending rock type identification in un-cored wells should apply a cluster analysis approach by using well logs data. Reservoir zonation has been achieved by cluster analysis approach and for each group known as cluster which variation and different with others. Five clusters generated in this study and permeability estimated depend on these groups in un-cored wells by using well log data that gives good results compared with different empirical methods.
Signature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also unable to adjust to various
... Show MoreThe use analysis value chain such information in the provision as financial so information quality meet and satisfy the needs of users such information , particularly investors and lenders as the identification needs financial information and the knowledge as their behavior influenced by that information can be based on the accounting profession to focus on improving their function in order to achieve its goal that satisfying their needs and rationalize their decisions . In accounting thought discovered fertile ground for users preferences as one of the entrances theorising positive which is based on the need to include knowledge on accounting hypothesis that explain the
... Show MoreThe current study is concerned with the analysis of spatial and temporal to death the elderly population in the city of Baghdad and at the level of administrative units Minor (districts and the areas) depending on the general population census of the province of Baghdad, data for 1997 and data from the Ministry of Health Department of Health and Vital Statistics for 2013.
The study showed differing age and quality of mortality rates at the level of administrative units of the study area, and notes the high mortality rates of elderly people of all age groups in 2013 compared to 1997, and this is due to security conditions after the USA occupation, and the accompanying conditions have affected the increase in mortality rates.
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreThe field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet
... Show More