Preferred Language
Articles
/
oBYyLIcBVTCNdQwCRzu1
Calculating heterogeneity of Majnoon Field/Hartha Reservoir using Lorenz Coefficient method
...Show More Authors
Abstract<p>One of the principle concepts to understand any hydrocarbon field is the heterogeneity scale; This becomes particularly challenging in supergiant oil fields with medium to low lateral connectivity and carbonate reservoir rocks.</p><p>The main objectives of this study is to quantify the value of the heterogeneity for any well in question, and propagate it to the full reservoir. This is a quite useful specifically prior to conducting detailed water flooding or full field development studies and work, in order to be prepared for a proper design and exploitation requirements that fit with the level of heterogeneity of this formation.</p><p>The main tool used for these purposes is the application of the famous Lorenz coefficient method for calculating the degree of heterogeneity for any well. The starting point for this kind of complicated studies needs to start from the basics, in order to understand the big picture and be able to plan properly for the scope to be delivered, hence, utilizing analytical tools like the ones mentioned above becomes quite necessary, if not crucial, to the success of full field modelling and choosing an optimum water flood pattern and design.</p><p>This paper covers the methodology for quantifying and calculating the level of heterogeneity in a given reservoir (Majnoon Field/Hartha Reservoir) using three out of four original wells of this reservoir, and how this value impacts and directly feeds into planning for water flooding projects and selection of an optimum flood pattern.</p><p>This methodology has been tested successfully in the stated super giant oil field, in which the reservoir in question is a carbonate rock formation. It is important to note that the chosen reservoir is giant areally with moderate thickness. An example of this is covered in the paper. It was concluded that utilizing a heterogeneity calculation method before conducting a detailed reservoir simulation study can save a lot of time and effort by providing guidance to the path which needs to be followed, and sheds light on the critical elements to be looked after. This has also helped to uncover many insights on the reservoir itself, hence allowing the engineer to plan for the necessary voidage replacement and water injection rates to sustain the reservoir pressure and pattern development.</p><p>The suggested method, in combination with geological and petro physical information available, can be applied to majority of the reservoirs. This combination is paramount to ensure optimum time and planning is followed for each reservoir development study that involves water flooding.</p>
Scopus Crossref
View Publication
Publication Date
Thu Nov 13 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of shear bond strength of artificial teeth to heat cure acrylic and high impact heat cure acrylic using autoclave processing method
...Show More Authors

Background: Debonding and fracture of artificial teeth from denture bases are common clinical problem, bonding of artificial teeth to heat cure acrylic and high impact heat cure acrylic denture base materials with autoclave processing method is not well known. The aim of this study was to evaluate the effect of autoclave processing method on shear bond of artificial teeth to heat cure denture base material and high impact heat cure denture base material. Materials and methods: Heat polymerized (Vertex) and high impact acrylic (Vertex) acrylic resins were used. Teeth were processed to each of the denture base materials after the application of different surface treatments. The sample (which consist of artificial tooth attached to the dentur

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Computers &amp; Mathematics With Applications
Analytical and numerical solutions for the nonlinear Burgers and advection–diffusion equations by using a semi-analytical iterative method
...Show More Authors

View Publication
Crossref (24)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
1st Samarra International Conference For Pure And Applied Sciences (sicps2021): Sicps2021
Analysis the average lattice strain in the crystal direction (hkl) in MgO nanoparticles by using modified Williamson-Hall method
...Show More Authors

In this work ,the modified williamos-Hall method was used to analysis the x-ray diffraction lines for powder of magnesium oxide nanoparticles (Mgo) .and for diffraction lines (111),(200),(220),(311) and (222).where by used special programs such as origin pro Lab and Get Data Graph ,to calculate the Full width at half maximum (FWHM) and integral breadth (B) to calculate the area under the curve for each of the lines of diffraction .After that , by using modified Williamson –Hall equations to determin the values of crystallite size (D),lattice strain (ε),stress( σ ) and energy (U) , where was the results are , D=17.639 nm ,ε =0.002205 , σ=0.517 and U=0.000678 respectively. And then using the scherrer method can by calculated the crystal

... Show More
View Publication
Scopus (8)
Crossref (8)
Scopus Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Between Shrinkage &Maximum likelihood Method For Estimation Parameters &Reliability Function With 3- Parameter Weibull Distribution By Using Simulation
...Show More Authors

The 3-parameter Weibull distribution is used as a model for failure since this distribution is proper when the failure rate somewhat high in starting operation and these rates will be decreased with increasing time .

In practical side a comparison was made between (Shrinkage and Maximum likelihood) Estimators for parameter and reliability function using simulation , we conclude that the Shrinkage estimators for parameters are better than maximum likelihood estimators but the maximum likelihood estimator for reliability function is the better using statistical measures (MAPE)and (MSE) and for different sample sizes.

Note:- ns : small sample ; nm=median sample

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Results In Nonlinear Analysis
Numerical solutions for the time fractional Black-Scholes model governing European option by using double integral transform decomposition method
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Big data analysis by using one covariate at a time multiple testing (Ocmt) method: Early school dropout in iraq
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Mar 13 2019
Journal Name
Al-khwarizmi Engineering Journal
Transient Behavior Analysis for Solar Energy Storage in PCM-CFM Material Using Equivalent Heat Capacity Method as Storage Model
...Show More Authors

A paraffin wax and copper foam matrix were used as a thermal energy storage material in the double passes air solar chimney (SC) collector to get ventilation effect through daytime and after sunset. Air SC collector was installed in the south wall of an insulated test room and tested with different working angles (30o, 45o and 60o). Different SC types were used; single pass, double passes flat plate collector and double pass thermal energy storage box collector (TESB). A computational model based on the finite volume method for transient tw dimensional domains was carried out to describe the heat transfer and storage in the thermal energy storage material of collector. Also, equivalent specific heat metho

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of weighted estimated method and proposed method (BEMW) for estimation of semi-parametric model under incomplete data
...Show More Authors

Generally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (19)
Crossref (9)
Scopus Crossref