Preferred Language
Articles
/
pobhSoYBIXToZYALrYEi
Evaluation of Geomechanical Properties for Tight Reservoir Using Uniaxial Compressive Test, Ultrasonic Test, and Well Logs Data
...Show More Authors

Tight reservoirs have attracted the interest of the oil industry in recent years according to its significant impact on the global oil product. Several challenges are present when producing from these reservoirs due to its low to extra low permeability and very narrow pore throat radius. Development strategy selection for these reservoirs such as horizontal well placement, hydraulic fracture design, well completion, and smart production program, wellbore stability all need accurate characterizations of geomechanical parameters for these reservoirs. Geomechanical properties, including uniaxial compressive strength (UCS), static Young’s modulus (Es), and Poisson’s ratio (υs), were measured experimentally using both static and dynamic methods. Measured mechanical parameters on cores are used to correct well logs derived mechanical earth model (MEM). The analysis of measured mechanical properties of samples was conducted using the knowledge of cores mineralogy which was done in this study by the X-Ray Diffraction (XRD) test in addition to rock texture which was obtained using scanning electronic microscope (SEM). The study of SEM and TS of the samples explain the presence of vugges in some samples that cause its initial high porosity and consequently low UCS, also it causes lower compressional and shear velocity at these samples as compared to others. The minerals contained in each sample give a descriptive analysis of the difference of the values of both static and dynamic measured mechanical properties such as ultrasonic pulse traveling time, elastic properties, and UCS; this was explained through XRD results.

Publication Date
Tue Mar 03 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of repetitive estimation methodsSelf-data
...Show More Authors

In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation)  structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of  these procedures and compare them using generated data.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 23 2020
Journal Name
Artificial Intelligence Research
Hybrid approaches to feature subset selection for data classification in high-dimensional feature space
...Show More Authors

This paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe

... Show More
View Publication
Crossref
Publication Date
Tue Jun 12 2007
Journal Name
Iraqi Journal Of Laser
Nonlinear Optical Properties of CdS Thin Film Nanoparticles Using z-Scan Technique
...Show More Authors

In the present work, a z-scan technique was used to study the nonlinear optical properties, represented by the nonlinear refractive index and nonlinear absorption coefficients of nanoparticles cadmium sulfide thin film. The sample was prepared by the chemical bath deposition method. Several testing were done including, x-ray, transmission and thickness of thin film. z-Scan experiment was performed at two wavelengths (1064 nm and 532 nm) and different energies. The results showed the effect of self-focusing in the material at higher intensities, which evaluated n2 to be (0.11-0.16) cm2/GW. The effect of two-photon absorption was studied, which evaluated β to be (24-106) cm/GW. In addition, the optical limiting behavior has been studied.

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering Science And Technology
Using sustainable material in improvement the geotechnical properties of soft clayey soil
...Show More Authors

Preview PDF
Scopus (39)
Scopus
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue May 20 2008
Journal Name
Journal Of Planner And Development
Estimating Water Quality from Satellite Image and Reflectance Data
...Show More Authors

The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables

View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Classification & Evaluation of Evidence of deprivation in Iraq (2009) by using Cluster analysis
...Show More Authors

       The study aimed to reach the best rating for the views and variables in the totals characterized by qualities and characteristics common within each group and distinguish them from aggregates other for the purpose of distinguishing between Iraqi provinces which suffer from deprivation, for the purpose of identifying the status of those provinces in the early allowing interested parties and regulators to intervene to take appropriate corrective action in a timely manner. Style has been used cluster analysis Cluster analysis to reach the best rating to those totals from the provinces that suffer from problems, where the provinces were classified, based on the variables (Edu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Evaluation of Sustainable Spatial Suitability of Urban and Population Expansion in Al Hillah City Using Remote Sensing Techniques
...Show More Authors
Abstract<p>The study focused on explaining urban expansion and sustainable development of urban land and explaining the role of population expansion in Al Hillah city, Al Hillah city in the center of Babylion Governorate located. The study relied on analyzing the population data of the city of Al Hillah for a period of time (22 years) for the period (2000-2022). This data was analyzed and its role in planning and designing residential areas and neighborhoods in the Al Hillah city was analyzed based on the standards of urban planning and sustainable growth of cities. Landsat 5TM was used in the investigation, Landsat 8OLI satellite data to retrieve the NDVI, NDBI, and NDWI. The findings showed th</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sun Dec 27 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluation the profitability of public commercial banks using liquidity indicators: A comparison of the Rafidain and Rasheed study
...Show More Authors

The issue of liquidity, profitability, and money employment, and capital fullness is one of the most important issues that gained high consideration by other authors and researchers in their attempts to find out the real relationship and how can balance be achieved, which is the main goal of each deposits.

For the sake of comprising the study variables, the research has formed the problem of the study which refers to the bank capability to enlarge profits without dissipation in liquidity   of the bank which will negatively reflect on the bank's fame as well as the customers' trust. For all these matters, the researcher has proposed a set of aims, the important of which is the estimation of the bank profitability; liquid

... Show More
View Publication Preview PDF