The investigation of machine learning techniques for addressing missing well-log data has garnered considerable interest recently, especially as the oil and gas sector pursues novel approaches to improve data interpretation and reservoir characterization. Conversely, for wells that have been in operation for several years, conventional measurement techniques frequently encounter challenges related to availability, including the lack of well-log data, cost considerations, and precision issues. This study's objective is to enhance reservoir characterization by automating well-log creation using machine-learning techniques. Among the methods are multi-resolution graph-based clustering and the similarity threshold method. By using cutting-edge machine learning techniques, our methodology shows a notable improvement in the precision and effectiveness of well-log predictions. Standard well logs from a reference well were used to train machine learning models. Additionally, conventional wireline logs were used as input to estimate facies for unclassified wells lacking core data. R-squared analysis and goodness-of-fit tests provide a numerical assessment of model performance, strengthening the validation process. The multi-resolution graph-based clustering and similarity threshold approaches have demonstrated notable results, achieving an accuracy of nearly 98%. Applying these techniques to data from eighteen wells produced precise results, demonstrating the effectiveness of our approach in enhancing the reliability and quality of well-log production.
Increasing hydrocarbon recovery from tight reservoirs is an essential goal of oil industry in the recent years. Building real dynamic simulation models and selecting and designing suitable development strategies for such reservoirs need basically to construct accurate structural static model construction. The uncertainties in building 3-D reservoir models are a real challenge for such micro to nano pore scale structure. Based on data from 24 wells distributed throughout the Sadi tight formation. An application of building a 3-D static model for a tight limestone oil reservoir in Iraq is presented in this study. The most common uncertainties confronted while building the model were illustrated. Such as accurate estimations of cut-off
... Show MoreFibroepithelioma of Pinkus (FEP) is a slowly growing, low-grade malignant tumor with very low metastatic potential that is considered a distinct variant of basal cell carcinoma (BCC). It usually manifests as sessile or polypoidal lesions on the trunk of middle-aged patients. However, it may present in younger age groups, even in children. In this case, we present a rare case of FEP atypically presenting as a scaly plaque on the lower back for several years in an elderly female who was eventually diagnosed by excisional biopsy and histopathology.
Hydatid disease is a zoonotic infection caused by Echinococcus species. The cystic form of this infection mostly involves liver and lung. Hydatid disease of the parotid gland even in endemic regions is a very rare entity that may be easily overlooked in daily practice. Herein, I present a case report of a 60-year-old Iraqi female patient who presented with a progressively painless mass in her right parotid. It was diagnosed radiologically as a hydatid cyst and was excised successfully. Histopathologic examination of the resected specimen confirmed the hydatid cyst. This case emphasizes the importance of considering hydatidosis in the differential diagnosis of any parotid mass, especially in endemic countries.
 
... Show MoreThe e-commerce is one of the best achievements of the twentieth century, since the conduct commercial transactions via the Internet may be the consumer easy selection process and purchase convenient manner different from traditional methods, and with the beginnings of the new millennium impose the emergence of e-commerce term significant challenges to the insurance industry as an important economic sectors Generally, and insurance companies in particular as a result of scientific development, which has led to a reduction in costs and innovation in the production, which led to intense competition on both levels local or global. The insurance industry is a vital part of the economy and it has a varied impact to the community and individual
... Show MoreThe research deals with the important and modern two subjects, strategic leadership which have six demotions and knowledge management
(four demotions') . the gools & the research is to know the relation & the effect them in the oil ministry (project department) , the sample was (50) persons who works in the department the questionnaire was the tool of data gathering .
The research divided to four parties, the first to the theotical review of the research variables, the second to the research methrology, the third to analysis and discoed the empirical results the last to the conclusions and recommendations .
Background: Proper cleaning and shaping of the whole root canal space have been recognized as a real challenge, particularly in oval-shaped canals.This in vitro study was conducted to evaluate and compare the efficiency of different instrumentation systems in removing of dentin debris at three thirds of oval-shaped root canals and to compare the percentage of remaining dentin debris among the three thirds for each instrumentation system. Materials and methods: Fifty freshly extracted human mandibular molars with single straight oval-shaped distal root canals were randomly divided into five groups of ten teeth each. Group One: instrumentation with ProTaper Universal hand instruments, Group Two: instrumentation with ProTaper Universal rotary
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreCharacterized Iraq, being one of the oldest countries where oil was discovered in the Middle East since 1927, and possess a vast oil reserves. In addition, the production and marketing of Iraqi oil continued since 1934 and until the present time. Over the past eight decades, the range of economic benefit of the financial Iraq’s oil resources varied according to the applicable forms of investments in the oil sector in Iraq.
This research included a study
... Show More