Preferred Language
Articles
/
joe-738
Estimation of Cutoff Values by Using Regression Lines Method in Mishrif Reservoir/ Missan oil Fields
...Show More Authors

Net pay is one of the most important parameters used in determining initial oil in place of a reservoir. It can be delineated through the using of limiting values of the petrophysical properties of the reservoir. Those limiting values are named as the cutoff. This paper provides an insight into the application of regression line method in estimating porosity, clay volume and water saturation cutoff values in Mishrif reservoir/ Missan oil fields. The study included 29 wells distributed in seven oilfields of Halfaya, Buzurgan, Dujaila, Noor, Fauqi, Amara and Kumait.

This study is carried out by applying two types of linear regressions: Least square and Reduce Major Axis Regression.

The Mishrif formation was divided into three main units. They are MA, MB, and MC. The methods were applied to each unit of Mishrif formation individually and as one unit. The division of Mishrif formation into subunits led to a great improvement in the accuracy of the porosity-permeability correlations. The Results indicated that the regression lines method of defining cutoffs gives unrealistic values with the common assumption of permeability cutoff = 0.1 md.

Another assumption for permeability cutoff = 1 is made and it was chosen due to lithology and hydrocarbon type which are limestone and oil respectively. This assumption led to more realistic and higher porosity cutoff and smaller water saturation and clay volume cutoff values using the two types of regression lines.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Natural Language Processing For Requirement Elicitation In University Using Kmeans And Meanshift Algorithm
...Show More Authors

 Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat May 04 2024
Journal Name
Anais Da Academia Brasileira De Ciências
Using decapsulated local brine shrimp cysts on feeding common carp larvae in hatcheries
...Show More Authors

The current study aims at using non-hatchable artemia eggs of local origin and making use of these eggs by decapsulating and presenting them as food for the larvae of the Cyprinus carpio as a source of animal protein with high nutritional value instead of throwing them away. The results showed that the second parameter (A2) was highly significant at the level (P≤0.05) in the growth rates of the larvae that were fed on decapsulated artemia eggs alone, and it was better than the two control parameters (A1), in which the larvae were fed with feed designated for Cyprinus carpio fish. It also outperformed the third parameter (A3), in which the feed was mixed with artemia eggs with 50% decapsulation, which also outperformed the control paramete

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Urinary Tract Stones Fragmentation using (2100 nm) Holmium: YAG Laser: (In vitro Analysis)
...Show More Authors

Urinary stones are one of the most common painful disorders of the urinary system. Four new technologies have transformed the treatment of urinary stones: Electrohydraulic lithotripsy, ultrasonic lithotripsy, extracorporeal shock wave lithotripsy, and laser lithotripsy.The purpose of this study is to determine whether pulsed holmium laser energy is an effective method for fragmenting urinary tract stones in vitro, and to determine whether stone composition affects the efficacy of holmium laser lithotripsy. Human urinary stones of known composition with different sizes, shapes and colors were used for this study. The weight and the size of each stone were measured. The surgical laser system which used in our study is Ho:YAG laser(2100nm)

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Community Detection in Modular Complex Networks Using an Improved Particle Swarm Optimization Algorithm
...Show More Authors

     Community detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem.  In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Mechanical Science And Technology
Damage detection in glass/epoxy composite structure using 8–12 GHz X-band
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2018
Journal Name
2018 15th European Radar Conference (eurad)
Delamination Detection in Glass-Fibre Reinforced Polymer (GFRP) Using Microwave Time Domain Reflectometry
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Human Skin WoundWelding Using 980 nm Diode Laser: an in Vitro Experimental Study
...Show More Authors

Laser assisted skin wound closure offers many distinct advantages over conventional closure
techniques. The objective of this in vitro experimental study, carried out at the Institute of Laser for
Postgraduate Studies/Baghdad University, was to determine the effectiveness of 980 nm diode laser in
welding of human skin wounds. Multiple 3-4 cm long full thickness incisions in a specimen of human
skin obtained from the discarded panniculus of an Abdominoplasty operation were tried to be laser
welded using a 4 mm spot diameter laser beam from a 980 nm diode laser at different laser parameters
and modes of action. The tensile strength at the weld site was analyzed experimentally. Although laser
assisted wound welding did

... Show More
View Publication Preview PDF