Empirical and statistical methodologies have been established to acquire accurate permeability identification and reservoir characterization, based on the rock type and reservoir performance. The identification of rock facies is usually done by either using core analysis to visually interpret lithofacies or indirectly based on well-log data. The use of well-log data for traditional facies prediction is characterized by uncertainties and can be time-consuming, particularly when working with large datasets. Thus, Machine Learning can be used to predict patterns more efficiently when applied to large data. Taking into account the electrofacies distribution, this work was conducted to predict permeability for the four wells, FH1, FH2, FH3, and FH19 from the Yamama reservoir in the Faihaa Oil Field, southern Iraq. The framework includes: calculating permeability for uncored wells using the classical method and FZI method. Topological mapping of input space into clusters is achieved using the self-organizing map (SOM), as an unsupervised machine-learning technique. By leveraging data obtained from the four wells, the SOM is effectively employed to forecast the count of electrofacies present within the reservoir. According to the findings, the permeability calculated using the classical method that relies exclusively on porosity is not close enough to the actual values because of the heterogeneity of carbonate reservoirs. Using the FZI method, in contrast, displays more real values and offers the best correlation coefficient. Then, the SOM model and cluster analysis reveal the existence of five distinct groups.
The dimensions of bubbles were measured in a stirrer tank electrochemical reactor, where the analysis of the bubble size distribution has a substantial impact on the flow dynamics. The high-speed camera and image processing methods were used to obtain a reliable photo. The influence of varied air flow rates (0.3; 0.5; 1 l/min) on BSD was thoroughly investigated. Two types of distributors (cubic and circular) were examined, and the impact of various airflow rates on BSD was investigated in detail. The results showed that the bubbles for the two distributors were between 0.5 and 4.5 mm. For both distributors at each airflow, the Sauter mean diameter for the bubbles was calculated. According to the results, as the flow rate raised, the bubb
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreThe current study focuses on utilizing artificial intelligence (AI) techniques to identify the optimal locations of production wells and types for achieving the production company’s primary objective, which is to increase oil production from the Sa’di carbonate reservoir of the Halfaya oil field in southeast Iraq, with the determination of the optimal scenario of various designs for production wells, which include vertical, horizontal, multi-horizontal, and fishbone lateral wells, for all reservoir production layers. Artificial neural network tool was used to identify the optimal locations for obtaining the highest production from the reservoir layers and the optimal well type. Fo
Metasurface polarizers are essential optical components in modern integrated optics and play a vital role in many optical applications including Quantum Key Distribution systems in quantum cryptography. However, inverse design of metasurface polarizers with high efficiency depends on the proper prediction of structural dimensions based on required optical response. Deep learning neural networks can efficiently help in the inverse design process, minimizing both time and simulation resources requirements, while better results can be achieved compared to traditional optimization methods. Hereby, utilizing the COMSOL Multiphysics Surrogate model and deep neural networks to design a metasurface grating structure with high extinction rat
... Show MoreSince the beginning of the last century, the competition for water resources has intensified dramatically, especially between countries that have no agreements in place for water resources that they share. Such is the situation with the Euphrates River which flows through three countries (Turkey, Syria, and Iraq) and represents the main water resource for these countries. Therefore, the comprehensive hydrologic investigation needed to derive optimal operations requires reliable forecasts. This study aims to analysis and create a forecasting model for data generation from Turkey perspective by using the recorded inflow data of Ataturk reservoir for the period (Oct. 1961 - Sep. 2009). Based on 49 years of real inflow data
... Show MoreThe importance of the research comes from dealing with the problem of lack of traffic awareness, which causes accidents and the occurrence of human and material losses, and the research aims to study the role of satellite channels in forming traffic awareness among the public, and a sample was chosen from Baghdad consisting of (280) individuals, male and female, and used the questionnaire tool. To obtain the data, which included several questions, the results were analyzed statistically and several results were reached, the most important of which is that there is an interest among the public in following traffic programs at a rate of one to two hours to receive information through traffic programs and to identify and apply gener
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More
To identify the importance of the role of succession planning in developing human capital in organizations in light of the accelerating and dynamic events and changes in the work environment, and the research problem indicated the seriousness of employees retiring or leaving their positions for any reason and the extent of its impact on the organization in creating gaps in leadership and problems In managing the talent injection because there will be a shortage of talent, which in turn will affect the general performance of the business in the researched institute, so the importance of research appears in trying to present a set of solutions through which some of the problems facing the organization in quest
... Show More