Preferred Language
Articles
/
pEIeo5oBMeyNPGM3Gc7p
Improving Carbonate Reservoir Development Decision: A Study of Controlling Factors Based on Geological and Engineering Objectives, Halfaya Oil Field
...Show More Authors

Detecting the optimum layer for well placement, which requires a diverse assortment of tools and techniques, represents a significant challenge in petroleum studies due to its critical impact on minimizing drilling costs and time. This study aims to evaluate integrated geological, petrophysical, seismic, and geomechanical data to identify the optimum zones for well placement. Three different reservoirs were analyzed to account for lateral and vertical variations in reservoir properties. The integrated data from these reservoirs provides many tools for reservoir development, especially to detect appropriate well placement zones based on evaluations of reservoir and geomechanical quality. The Mechanical Earth Model (MEM) was constructed using well logging data from 14 wells to estimate reservoir breakdown pressures. The reservoir instability results obtained from the MEM were discussed based on wellbore failure criteria, including breakout, drilling fluid losses, and breakdown pressures. Additionally, seismic data was utilized to offer essential insights for determining optimum well locations by identifying the boundaries between the reservoir beds. The horizontal stress contrast, Young's modulus, Poisson's ratio, and unconfined compressive strength were analyzed to reflect the geomechanical quality of the reservoir. Appropriate layers for placing a horizontal well were considered based on both geological and engineering objectives. This work showed that geomechanical models, along with petrophysical models and seismic data, should be considered for selecting the optimum zone for reservoir development.

Crossref
View Publication
Publication Date
Thu Jan 27 2022
Journal Name
Nanomaterials
Improving the Melting Duration of a PV/PCM System Integrated with Different Metal Foam Configurations for Thermal Energy Management
...Show More Authors

The melting duration in the photovoltaic/phase-change material (PV/PCM) system is a crucial parameter for thermal energy management such that its improvement can realize better energy management in respect to thermal storage capabilities, thermal conditions, and the lifespan of PV modules. An innovative and efficient technique for improving the melting duration is the inclusion of an exterior metal foam layer in the PV/PCM system. For detailed investigations of utilizing different metal foam configurations in terms of their convective heat transfer coefficients, the present paper proposes a newly developed mathematical model for the PV/PCM–metal foam assembly that can readily be implemented with a wide range of operating condition

... Show More
View Publication
Scopus (34)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (44)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Lossless Image Compression based on Predictive Coding and Bit Plane Slicing
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (20)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Goal Conflict among Twelfth-Grade Students based on Gender and Major
...Show More Authors

The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (11)
Scopus Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
Effect Of Using Quantitative Methods Of Demand Forecasting In Improving Of Supply Chain Performance:" Case Study In One Of An Industerial Organization"
...Show More Authors

Objecte The study aims to test the effect of using the appropriate quantitative method of demand forecasting in improving the performance of supply chain of the aviation fuel product ( The study sample), One of the products of the Doura refinery (The study site), By testing a set of quantitative methods of demand forecasting using forecasting error measurements, and choosing the least faulty, most accurate and reliable method and adept it in the building  chain.

Is the study of problem through a starting with the fol

... Show More
View Publication Preview PDF
Crossref (1)
Crossref