Empirical and statistical methodologies have been established to acquire accurate permeability identification and reservoir characterization, based on the rock type and reservoir performance. The identification of rock facies is usually done by either using core analysis to visually interpret lithofacies or indirectly based on well-log data. The use of well-log data for traditional facies prediction is characterized by uncertainties and can be time-consuming, particularly when working with large datasets. Thus, Machine Learning can be used to predict patterns more efficiently when applied to large data. Taking into account the electrofacies distribution, this work was conducted to predict permeability for the four wells, FH1, FH2, FH3, and FH19 from the Yamama reservoir in the Faihaa Oil Field, southern Iraq. The framework includes: calculating permeability for uncored wells using the classical method and FZI method. Topological mapping of input space into clusters is achieved using the self-organizing map (SOM), as an unsupervised machine-learning technique. By leveraging data obtained from the four wells, the SOM is effectively employed to forecast the count of electrofacies present within the reservoir. According to the findings, the permeability calculated using the classical method that relies exclusively on porosity is not close enough to the actual values because of the heterogeneity of carbonate reservoirs. Using the FZI method, in contrast, displays more real values and offers the best correlation coefficient. Then, the SOM model and cluster analysis reveal the existence of five distinct groups.
الزكاة فريضة من فرائض الإسلام وعبادة من العبادات التي اقرها الشرع الإسلامي هذه الفريضة المالية التعبدية بالإضافة الى دورها المعنوي الذي يهدف الى إرساء قواعد العدالة الاجتماعية والقضاء على مشكلة الفقر في المجتمع الاسلامي وكما ينص عليها الدين الإسلامي فان لها ابعادها ووظائفها الكثيرة التي تخدم اليات العمل الاقتصادي في مجتمع يعمل وفق نظام اقتصادي أسلامي .
ان انفاق الاموال المتحصلة من فريض
... Show More<span lang="EN-US">Diabetes is one of the deadliest diseases in the world that can lead to stroke, blindness, organ failure, and amputation of lower limbs. Researches state that diabetes can be controlled if it is detected at an early stage. Scientists are becoming more interested in classification algorithms in diagnosing diseases. In this study, we have analyzed the performance of five classification algorithms namely naïve Bayes, support vector machine, multi layer perceptron artificial neural network, decision tree, and random forest using diabetes dataset that contains the information of 2000 female patients. Various metrics were applied in evaluating the performance of the classifiers such as precision, area under the c
... Show MoreEach project management system aims to complete the project within its identified objectives: budget, time, and quality. It is achieving the project within the defined deadline that required careful scheduling, that be attained early. Due to the nature of unique repetitive construction projects, time contingency and project uncertainty are necessary for accurate scheduling. It should be integrated and flexible to accommodate the changes without adversely affecting the construction project’s total completion time. Repetitive planning and scheduling methods are more effective and essential. However, they need continuous development because of the evolution of execution methods, essent
Research summary
This research discloses the study of the methodology of one of the notables of the followers, which is: (Abi Mijlis Al-Basri), who had a clear impact on many commentators after him, especially in the field of interpretation by impact. This study included two topics:
The first: his biography and scientific
The second: his methodology in the traditional interpretation.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreA new colorimetric-flow injection method has been developed and validated for the detection of Cefotaxime sodium in pharmaceutical formulations. This method stands out for its rapid and sensitive nature. The formation of a brown-colored complex between Cefotaxime sodium and the Biuret reagent in a highly alkaline environment serves as the basis for the detection. The intensity of this colored complex is measured using a custom-built Continuous Flow Injection Analyzer, enabling accurate quantification of Cefotaxime sodium. Optimization studies of the chemical and physical parameters such as dilution of Biuret reagent, effect of the medium basicity, flow rate, sample loop and others have been investigated. The calibration gra
... Show MoreStatistical methods and statistical decisions making were used to arrange and analyze the primary data to get norms which are used with Geographic Information Systems (GIS) and spatial analysis programs to identify the animals production and poultry units in strategic nutrition channels, also the priorities of food insecurity through the local production and import when there is no capacity for production. The poultry production is one of the most important commodities that satisfy human body protein requirements, also the most important criteria to measure the development and prosperity of nations. The poultry fields of Babylon Governorate are located in Abi Ghareg and Al_Kifil centers according to many criteria or factors such as the popu
... Show MoreThe Ant System Algorithm (ASA) is a member of the ant colony algorithms family in swarm intelligence methods (part of the Artificial Intelligence field), which is based on the behavior of ants seeking a path and a source of food in their colonies. The aim of This algorithm is to search for an optimal solution for Combinational Optimization Problems (COP) for which is extremely difficult to find solution using the classical methods like linear and non-linear programming methods.
The Ant System Algorithm was used in the management of water resources field in Iraq, specifically for Haditha dam which is one of the most important dams in Iraq. The target is to find out an efficient management system for
... Show MoreAt the end of 2019, a new form of Coronavirus (later dubbed COVID-19) emerged in China and quickly spread to other regions of the globe. Despite the virus’s unique and unknown characteristics, it is a widely distributed infectious illness. Finding the geographical distribution of the virus transmission is therefore critical for epidemiologists and governments in order to respond to the illness epidemic rapidly and effectively. Understanding the dynamics of COVID-19’s spatial distribution can help to understand the pandemic’s scope and effects, as well as decision-making, planning, and community action aimed at preventing transmission. The main focus of this study is to investigate the geographic patterns of COVID-19 disseminat
... Show More