Preferred Language
Articles
/
ijcpe-323
Permeability Prediction of Un-Cored Intervals Using FZI Method and Matrix Density Grouping Method: A Case Study of Abughirab Field/Asmari FM., Iraq
...Show More Authors

Knowledge of permeability is critical for developing an effective reservoir description. Permeability data may be calculated from well tests, cores and logs. Normally, using well log data to derive estimates of permeability is the lowest cost method. This paper will focus on the evaluation of formation permeability in un-cored intervals for Abughirab field/Asmari reservoir in Iraq from core and well log data. Hydraulic flow unit (HFU) concept is strongly related to the flow zone indicator (FZI) which is a function of the reservoir quality index (RQI). Both measures are based on porosity and permeability of cores. It is assumed that samples with similar FZI values belong to the same HFU. A generated method is also used to calculate permeability in un-cored zones depending on matrix density grouping, where each group has its own permeability-porosity correlation. After applying the both methods and correlating the calculated permeability with the core permeability data it revealed that matrix density grouping is the best method to calculate permeability in un-cored zones and it is better than FZI method in this field, then the estimated permeability is distributed through the members of Asmari reservoir in Abughirab field and it is concluded that permeability in this field is generally increases toward south culmination of Abughirab field.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
Iraqi Geological Journal
Advanced Geostatistical Techniques for Building 3D Geological Modeling: A Case Study from Cretaceous Reservoir in Bai Hassan Oil Field
...Show More Authors

A 3D Geological model was generated using an advanced geostatistical method for the Cretaceous reservoir in the Bai Hassan oil field. In this study, a 3D geological model was built based on data from four wells for the petrophysical property distribution of permeability, porosity, water saturation, and NTG by using Petrel 2021 software. The geological model was divided into a structural model and a property model. The geological structures of the cretaceous reservoir in the Bai Hassan oil field represent elongated anticline folds with two faults, which had been clarified in the 3D Structural model. Thirteen formations represent the Cretaceous reservoir which includes (Shiranish, Mashurah, U.kometan, Kometan Shale, L. Kometan, Gulnen

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Study the Structural and Optical Properties of Cr doped SnO2 Nanoparticles Synthesized by Sol-Gel Method
...Show More Authors

View Publication
Scopus (54)
Crossref (49)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 01 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
The Construction of (k, 3)-Arcs in PG (2, 9) by Using Geometrical Method
...Show More Authors

In this work, we construct projectively distinct (k,3)-arcs in the projective plane PG(2,9) by applying a geometrical method. The cubic curves have been been constructed by using the general equation of the cubic. We found that there are complete (13,3)-arcs, complete (15,3)-arcs and we found that the only (16,3)-arcs lead to maximum completeness

Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Solving Linear Volterra – Fredholm Integral Equation of the Second Type Using Linear Programming Method
...Show More Authors

In this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree  and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Simulation the Radiation Zone of Al-Mussaib Power Plant by Using Monte Carlo Method
...Show More Authors

The temperature distributions are to be evaluated for the furnace of Al-Mussaib power plant. Monte Carlo simulation procedure is used to evaluate the radiation heat transfer inside the furnace, where the radiative transfer is the most important process occurring there. Weighted sum of gray-gases model is used to evaluate the radiative properties of the non gray gas in the enclosure. The energy balance equations are applied for each gas, and surface zones, and by solving these equations, both the temperature, and the heat flux are found.

   Good degree of accuracy has been obtained, when comparing the results obtained by the simulation with the data of the designing company, and the data obtained by the zonal method. In

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Approximate Solution of Delay Differential Equations Using the Collocation Method Based on Bernstien Polynomials???? ???????? ????????? ????????? ????????? ???????? ?????????? ???????? ??? ??????? ???? ?????????
...Show More Authors

In this paper a modified approach have been used to find the approximate solution of ordinary delay differential equations with constant delay using the collocation method based on Bernstien polynomials.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Solving Linear Volterra – Fredholm Integral Equation of the Second Type Using Linear Programming Method
...Show More Authors

In this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree  and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those methods i

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
PROJECT MANAGEMENT OF BALAD`S MAJOR SEWERAGE SYSTEM BY USING THE GOAL PROGRAMMING METHOD
...Show More Authors

Abstract

          The project of balad's major sewerage system is one of the biggest projects who is still in progress in salahulddin province provincial - development plan that was approved in 2013 . This project works in two parts ; the 1st is installing the sewerage networks (both of heavy sewerage & rain sewerage) and the 2nd is installing the     life – off units (for heavy sewerage & rain sewerage , as well) . the directorate of salahuiddin is aiming that at end of construction it will be able to provide services for four residential quarters , one of the main challenges that project's  management  experience is how to achieve thes

... Show More
View Publication Preview PDF
Crossref