Reservoir permeability plays a crucial role in characterizing reservoirs and predicting the present and future production of hydrocarbon reservoirs. Data logging is a good tool for assessing the entire oil well section's continuous permeability curve. Nuclear magnetic resonance logging measurements are minimally influenced by lithology and offer significant benefits in interpreting permeability. The Schlumberger-Doll-Research model utilizes nuclear magnetic resonance logging, which accurately estimates permeability values. The approach of this investigation is to apply artificial neural networks and core data to predict permeability in wells without a nuclear magnetic resonance log. The Schlumberger-Doll-Research permeability is used to train the model, where the model prediction result is validated with core permeability. Seven oil well logs were used as input parameters, and the model was constructed with Techlog software. The predicted permeability with the model compared with Schlumberger-Doll-Research permeability as a cross plot, which results in the correlation coefficient of 94%, while the predicted permeability validated with the core permeability of the well, which obtains good agreement where R2 equals 80%. The model was utilized to forecast permeability in a well that did not have a nuclear magnetic resonance log, and the predicted permeability was cross-plotted against core permeability as a validation step, with a correlation coefficient of 77%. As a result, the low percentage of matching was due to data limitations, which demonstrated that as the amount of data used to train the model increased, so did the precision.
Given the importance of possessing the digital competence (DC) required by the technological age, whether for teachers or students and even communities and governments, educational institutions in most countries have sought to benefit from modern technologies brought about by the technological revolution in developing learning and teaching and using modern technologies in providing educational services to learners. Since university students will have the doors to work opened in all fields, the research aims to know their level of DC in artificial intelligence (AI) applications and systems utilizing machine learning (ML) techniques. The descriptive approach was used, as the research community consisted of students from the University
... Show MoreIntroduction. Tangential gunshot wounds (TGSW) to the head is the high-velocity bullet that does not penetrate the cranium but passes through the tissue adjoining the cranial cavity, creating a “gutter” wound and indirectly causing cerebral injury. This article presents a reporting case of TGSW to the head, discusses the mechanism underlying this traumatic injury and the possible complications resulting from it, and reviews of literature. Case description. A thirteen-year-old schoolboy was admitted to the emergency department (ER) of the neurosurgery teaching hospital in Baghdad, Iraq, with a tangential gunshot to the head of an unknown source during civilian protests in Baghdad. In addition to a seizure attack in the ER, his
... Show MoreBecause of the tremendous changes in the business environment and significant growth in living standards, increased demand for services in general and about the realized practitioners in the field of service that traditional marketing strategies and models administrative based solutions to mono as the price alone does not lead to the desired outcomes with customers and even organizations as it does not apply always for the manufacture of their services unique . therefore , the need to learn marketing service order and a clear and critical to avoid failures in service and the marketing document to knowledge would avoid the organization that the failure in the delivery of service and enhances the desired response to fix it in a tim
... Show Moresignificant bits either in the spatial domain or frequency domain sequentially or pseudo
randomly through the cover media (Based on this fact) statistical Steganalysis use different
techniques to detect the hidden message, A proposed method is suggested of a stenographic
scheme a hidden message is embedded through the second least significant bits in the
frequency domain of the cover media to avoid detection of the hidden message through the
known statistical Steganalysis techniques.
The method of work is not a method made by grammarians. We have found more than guidance from the ancients and contemporaries; That to the corruption of meaning; or to apparent cost Not accepted by good linguistic taste.
Imagination as a Path to Reality
The research focuses,in the first place, on six fields.The most important one is
curriculum field which includes the revision of the current academic curriculums and
substitute them with recent ones, beside the rehabilitation of academic labs and factories by
providing them with modern scientific technologies employed in the world. Regarding the
economical field, it seeks to provide high-level training staffs to serve different social and
economical sectors through modern effective technological and scientific
curriculums.Whereas the social field assures the concern of different social classes who
deprived from the grace of higher education such as retirees and elderly people and to set-up
some educational and ent
In this research , we tried to identify the meaning empowerment in the development literatures , and inquire the most enabling prominent actions to promote women , as we considered the most important international conferences that take up the subject of women's empowerment .
In the context of research on the subject of empowering women to occupy leadership positions , we tried to diagnose the target of the empowerment , and we clarify the correlation between human development and empowerment of women , also the research touched on the decision (1325) issued by the United Nations , which includes provisions regarding the importance of women participation at all levels in the process of decision-making .
We realized that there are so
The aim of the research is to estimate the hidden population. Here، the number of drug users in Baghdad was calculated for the male age group (15-60) years old ، based on the Bayesian models. These models are used to treat some of the bias in the Killworth method Accredited in many countries of the world.
Four models were used: random degree، Barrier effects، Transmission bias، the first model being random، an extension of the Killworth model، adding random effects such as variance and uncertainty Through the size of the personal network، and when expanded by adding the fact that the respondents have different tendencies، the mixture of non-random variables with random to produce
... Show More