Preferred Language
Articles
/
joe-738
Estimation of Cutoff Values by Using Regression Lines Method in Mishrif Reservoir/ Missan oil Fields
...Show More Authors

Net pay is one of the most important parameters used in determining initial oil in place of a reservoir. It can be delineated through the using of limiting values of the petrophysical properties of the reservoir. Those limiting values are named as the cutoff. This paper provides an insight into the application of regression line method in estimating porosity, clay volume and water saturation cutoff values in Mishrif reservoir/ Missan oil fields. The study included 29 wells distributed in seven oilfields of Halfaya, Buzurgan, Dujaila, Noor, Fauqi, Amara and Kumait.

This study is carried out by applying two types of linear regressions: Least square and Reduce Major Axis Regression.

The Mishrif formation was divided into three main units. They are MA, MB, and MC. The methods were applied to each unit of Mishrif formation individually and as one unit. The division of Mishrif formation into subunits led to a great improvement in the accuracy of the porosity-permeability correlations. The Results indicated that the regression lines method of defining cutoffs gives unrealistic values with the common assumption of permeability cutoff = 0.1 md.

Another assumption for permeability cutoff = 1 is made and it was chosen due to lithology and hydrocarbon type which are limestone and oil respectively. This assumption led to more realistic and higher porosity cutoff and smaller water saturation and clay volume cutoff values using the two types of regression lines.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 23 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Image Compression Using Proposed Enhanced Run Length Encoding Algorithm
...Show More Authors

In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.

Preview PDF
Publication Date
Thu Sep 01 2022
Journal Name
Iraqi Journal Of Computers, Communications, Control And Systems Engineering
A Framework for Predicting Airfare Prices Using Machine Learning
...Show More Authors

Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Tue Jul 25 2023
Journal Name
Journal Of Optical Communications
Design mode filtering interferometer using etched double clad fiber
...Show More Authors
Abstract<p>Mode filtering technique is one of the most desired techniques in optical fiber communication systems, especially for multiple input multiple output (MIMO) coherent optical communications that have mode-dependent losses in communication channels. In this work, a special type of optical fiber sensing head was used, where it utilizes DCF13 that is made by Thorlabs and has two numerical apertures (NA’s). One is for core and 1st cladding region, while the 2nd relates the 1st cladding to the 2nd cladding. Etching process using 40 % hydro-fluoric (HF) acid was performed on the DCF13 with variable time in minutes. Investigation of the correlation between the degree of etching and the re</p> ... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Anemia Blood Cell localization Using Modified K- Means Algorithm
...Show More Authors

View Publication
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Tikrit Journal Of Pure Science
Optical Mark Recognition using Modify Bi-directional Associative Memory
...Show More Authors

Optical Mark Recognition (OMR) is an important technology for applications that require speedy, high-accuracy processing of a huge volume of hand-filled forms. The aim of this technology is to reduce manual work, human effort, high accuracy in assessment, and minimize time for evaluation answer sheets. This paper proposed OMR by using Modify Bidirectional Associative Memory (MBAM), MBAM has two phases (learning and analysis phases), it will learn on the answer sheets that contain the correct answers by giving its own code that represents the number of correct answers, then detection marks from answer sheets by using analysis phase. This proposal will be able to detect no selection or select more than one choice, in addition, using M

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Tourism Companies Assessment via Social Media Using Sentiment Analysis
...Show More Authors

In recent years, social media has been increasing widely and obviously as a media for users expressing their emotions and feelings through thousands of posts and comments related to tourism companies. As a consequence, it became difficult for tourists to read all the comments to determine whether these opinions are positive or negative to assess the success of a tourism company. In this paper, a modest model is proposed to assess e-tourism companies using Iraqi dialect reviews collected from Facebook. The reviews are analyzed using text mining techniques for sentiment classification. The generated sentiment words are classified into positive, negative and neutral comments by utilizing Rough Set Theory, Naïve Bayes and K-Nearest Neighbor

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using cleaner production costs to achieve sustainable competitive advantage
...Show More Authors

Abstract

                Target costing and cleaner production are among the most important techniques in the field of cost and management accounting, which, when integrated, enable economic units to achieve the goal of cost management by reducing it by calculating cost more accurately than traditional methods.To achieve this, the researcher relied on the inductive approach in writing the theoretical framework for the research, relying on foreign and Arabic books, dissertations and university theses, foreign and Arabic research and periodicals related to the subject of the research, and relying on the descriptive and analytical approach in

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Urology Annals
Modified snodgrass hypospadias repair using the lembert suturing technique
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref