A 3D geological model is an essential step to reveal reservoir heterogeneity and reservoir properties distribution. In the present study, a three-dimensional geological model for the Mishrif reservoir was built based on data obtained from seven wells and core data. The methodology includes building a 3D grid and populating it with petrophysical properties such as (facies, porosity, water saturation, and net to gross ratio). The structural model was built based on a base contour map obtained from 2D seismic interpretation along with well tops from seven wells. A simple grid method was used to build the structural framework with 234x278x91 grid cells in the X, Y, and Z directions, respectively, with lengths equal to 150 meters. The total number of grids is (5919732) in the geological model. CPI (computer-processed interpretation) for 7 wells contain (facies, porosity, water saturation, and NTG) was imported to Petrel 2016 software. Facies log was upscaled and distributed along the 3D grid. Truncated Gaussian with trend method was used to distribute the facies taking into account the conceptual facies model of the Mishrif formation. The result shows that the trend of sedimentation suggests a retrogradation pattern from NW to SE. Facies1 (Reservoir), dominated by Limestone brown to light brown, with oil shows has good distribution within the area and thinning towards the NW. The petrophysical properties (porosity, water saturation, NTG, and permeability) were distributed using the Sequential Gaussian Simulation (SIS) method and the facies model as a guide for distribution. The results show that petrophysical properties enhanced in the southeast area, representing the reef region compared to the northwest side of the study area. Unit Mishrif B had the highest porosity value and lower water saturation value along the entire field. While the units Mishrif B1, B2, and B3 show a gradual decrease in reservoir properties towards the field's southeast side. The results also show that the conceptual facies model has great benefit in constructing the 3D geological model, reflecting the geological knowledge used to correctly distribute the reservoir properties (porosity and water saturation).
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreVol. 6, Issue 1 (2025)
This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreCapillary pressure is a significant parameter in characterizing and modeling petroleum reservoirs. However, costly laboratory measurements may not be sufficiently available in some cases. The problem amplifies for carbonate reservoirs because relatively enormous capillary pressure curves are required for reservoir study due to heterogeneity. In this work, the laboratory measurements of capillary pressure and formation resistivity index were correlated as both parameters are functions of saturation. Forty-one core samples from an Iraqi carbonate reservoir were used to develop the correlation according to the hydraulic flow units concept. Flow zone indicator (FZI) and Pore Geometry and Structure (PGS) approaches were used to identify
... Show MoreCapillary pressure is a significant parameter in characterizing and modeling petroleum reservoirs. However, costly laboratory measurements may not be sufficiently available in some cases. The problem amplifies for carbonate reservoirs because relatively enormous capillary pressure curves are required for reservoir study due to heterogeneity. In this work, the laboratory measurements of capillary pressure and formation resistivity index were correlated as both parameters are functions of saturation. Forty-one core samples from an Iraqi carbonate reservoir were used to develop the correlation according to the hydraulic flow units concept. Flow zone indicator (FZI) and Pore Geometry and Structure (PGS) approaches were used to identify
... Show More