The Compressional-wave (Vp) data are useful for reservoir exploration, drilling operations, stimulation, hydraulic fracturing employment, and development plans for a specific reservoir. Due to the different nature and behavior of the influencing parameters, more complex nonlinearity exists for Vp modeling purposes. In this study, a statistical relationship between compressional wave velocity and petrophysical parameters was developed from wireline log data for Jeribe formation in Fauqi oil field south Est Iraq, which is studied using single and multiple linear regressions. The model concentrated on predicting compressional wave velocity from petrophysical parameters and any pair of shear waves velocity, porosity, density, and fluid saturation in carbonate rocks. A strong linear correlation between P-wave velocity and S-wave velocity and between P-wave velocity and density rock was found. The resulting linear equations can be used to estimate P-wave velocity from the S-wave velocity in the case of both. The results of multiple regression analysis indicated that the density, porosity, water-saturated, and shear wave velocity (VS) are strongly related to Vp.
Abstract
The issue of the protection of the environment is a shared responsibility between several destinations and sectors, and constitutes a main subject in which they can achieve sustainable development. In the sectors of government programs can be set up towards the establishment of the government sector to the green environment, so to be the implementati
... Show MoreThis study revolves around the rapid changes of science and a comparison of the formal and practical aspects and the reason behind summoning the changes and their types, which are subject to the influence of the recipient. This transformation represents formal and intellectual production cycles and formal functional generation that is subject to the goals of the system of multiple differences at the level of time and place. It meets the needs and the request for change, but access to it comes through multiple systems and portals that are different from the normal and the usual, so this study was called (meta and its dimensions in the designed biological formation (virtual reality environment - a model). The research seeks to find solutio
... Show MoreThe study aims to follow modern methods in teaching rhythmic gymnastics skills by directing learners to develop their perceptions and absorb what the world deals with today and develop intelligence among learners, the researchers searched for the strengths of the learner by providing them with an opportunity to form their kinetic formation, hence the problem came by introducing a method of self-intelligence and social to guide the learner in the search for ways and solutions to overcome boredom and economy Time and effort in the educational process in learning and give them the freedom to express their ideas And their skills and here came the role of social and self-intelligence to teach the individual and collective kinetic formati
... Show MoreOil recovery could be impacted by the relation between vertical permeability (Kv) and horizontal permeability (Kh) (Kv/Kh). 4816 plugs that have been getting hold of 18 wells of Mishrif formation in the West Qurna oilfield were used. Kv/Kh data provided some scatter, but the mean is ~1. Kv/Kh =1 was used for the Petrel model before upscaling according to the heterogeneity of each layer.
Kv/Kh values for Mishrif Formation in West Qurna Oilfield are 0.8 for relatively homogeneous, 0.4 for heterogeneous rock, and 0.1 for cap rocks (CRII).
Eclipse TM was used for reservoir simulation. PVT and SCAL data e
... Show MoreThe purpose of this article is to introduce reverse engineering procedure (REP). It can achieved by developing an industrial mechanical product that had no design schemes throughout the 3D-Scanners. The aim of getting a geometric CAD model from 3D scanner is to present physical model. Generally, this used in specific applications, like commercial plan and manufacturing tasks. Having a digital data as stereolithography (STL) format. Converting the point cloud be can developed as a work in programming by producing triangles between focuses, a procedure known as triangulation. Then it could be easy to manufacture parts unknown documentation and transferred the information to CNC-machines. In this work, modification was proposed and used in RE
... Show MoreThis Study aimed To know The relation between Types of blood and health problems which human Suffered from , and the effect of food intake on health.
Samples of study contained 269 person aged between 30 – 70 years which choiced randomly for sex , we are take all in formation about samples of study by form paper contian sex , age, type of blood , weight (kg) , height (cm) , smoking or.not , sporting or not, problems in digestive tract , sensitivity for foods , heart problems , ratio of cholesterol in blood , Sinusitis , Asthma , diabetic meliuts , arritable bowel syndrome , diaherra , problems in kidney and urination , hypertension , anemia , alternation in liver function , arthritis with form record in daily food intake and its ade
Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreA new set of metal complexes by the general formula [M(C)2(H2O)2]Cl2 has been prepared through the interaction of the new Ligand [N1, N4-bis(4-chlorophenyl)succinamide] (C) derived from succinyl chloride with 4-Chloroaniline with the transition metal ions Mn(II), Co(II), Ni(II), Hg(II), Cu(II) and Cd(II). Compounds diagnosed by TGA, 1 H, 13CNMR and Mass spectra (for (C)), Fourier-transform infrared and Electronic spectrum, Magnetic measurement, molar conduct, (%M, %C, %H, %N). These measurements indicate that (C) is associated with the metal ion in a bi-dentate fashion by nitrogen atoms (the amide group) and the octahedral composition of these complexes is suggested. The anti-bacterial action of the compounds towards three types of bacteria
... Show More