The term "tight reservoir" is commonly used to refer to reservoirs with low permeability. Tight oil reservoirs have caused worry owing to its considerable influence upon oil output throughout the petroleum sector. As a result of its low permeability, producing from tight reservoirs presents numerous challenges. Because of their low permeability, producing from tight reservoirs is faced with a variety of difficulties. The research aim is to performing hydraulic fracturing treatment in single vertical well in order to study the possibility of fracking in the Saady reservoir. Iraq's Halfaya oil field's Saady B reservoir is the most important tight reservoir. The diagnostic fracture injection test is determined for HF55using GOHFER software. Models for petrophysics and geology were calibrated using the diagnostic fracture injection test results after the petrophysical and geomechanical parameters of the rock have been determined. The HF55 vertical well, which penetrates the Saady reservoir, has well logs that have been used to evaluate the petrophysical and geomechanical parameters. These estimates have been supported by findings from the diagnostic fracture injection test through the utilization of standard equations and correlations. The findings of the diagnostic fracture injection test, often known as the diagnostic fracture injection test, are very compatible with the findings of the well logs. The diagnostic fracture injection test pre-falloff test event was examined to determine the instantaneous shut-in pressure and fracture gradient. In the meantime, Closure pressure, process zone stress, fracturing fluid efficiency, closure gradient, critical fissure opening pressure, storage correction factor, permeability, and pressure-dependent leak-off coefficient were all determined using the G function on plot. With the help of a specific software, the petrophysical and geomechanical properties of a single vertical well [HF55] was found. Saady B reservoir's upper and lower sections, along with it are therefore predicted to have the full range of petrophysical and geomechanical features. With the use of DFIT analysis, these features serve as the foundation for developing fracturing models.
Diabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att
... Show MoreShadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.
The penalized least square method is a popular method to deal with high dimensional data ,where the number of explanatory variables is large than the sample size . The properties of penalized least square method are given high prediction accuracy and making estimation and variables selection
At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and
... Show MoreCompressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp
... Show MoreAs we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.
Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera
... Show MoreThe evaluation and efficiency and effectiveness of account system for the department of delegation and cultural Relationships in the center of ministry of higher Education and Scientific research Considered as a very important and active subjects in the modification of accounting system in this department and to develop it and make it able to make available important and accurate information for the planning requirements and monetary and evaluation performance and to make decisions, besides to develop the performance of Iraqi Cultural departments working abroad and to render its role effective to serve the students of higher education in the progressive Countries to facility its growing in scientific and professional and technica
... Show MoreFree Space Optics (FSO) plays a vital role in modern wireless communications due to its advantages over fiber optics and RF techniques where a transmission of huge bandwidth and access to remote places become possible. The specific aim of this research is to analyze the Bit-Error Rate (BER) for FSO communication system when the signal is sent the over medium of turbulence channel, where the fading channel is described by the Gamma-Gamma model. The signal quality is improved by using Optical Space-Time Block- Code (OSTBC) and then the BER will be reduced. Optical 2×2 Alamouti scheme required 14 dB bit energy to noise ratio (Eb/N0) at 10-5 bit error rate (BER) which gives 3.5 dB gain as compared to no diversity scheme. Th
... Show MoreThis study investigates the effects of Al-Doura oil refinery effluent, in Baghdad city, on the water quality of the Tigris River using the Canadian Water Quality Index (CCME WQI) and Rivers Maintaining System (1967). Water samples were collected monthly from Tigris River at three stations, which are Al-Muthanna Bridge (upstream), Al-Doura Refinery (point source), and Al–Zafaraniya city (downstream) from October 2020 to April 2021. Fourteen water quality parameters were studied, namely pH (6.50-8.10), Water Temperature (WT) (5.00-27.00 °C), Electrical Conductivity (EC) (877.00-1192.00 μs/cm), Dissolved Oxygen (DO) (5.03-7.57 mg/L), Biological Oxygen demand (BOD) (0.53-2.23 mg/L), Total Dissolved S