A 3D geological model is an essential step to reveal reservoir heterogeneity and reservoir properties distribution. In the present study, a three-dimensional geological model for the Mishrif reservoir was built based on data obtained from seven wells and core data. The methodology includes building a 3D grid and populating it with petrophysical properties such as (facies, porosity, water saturation, and net to gross ratio). The structural model was built based on a base contour map obtained from 2D seismic interpretation along with well tops from seven wells. A simple grid method was used to build the structural framework with 234x278x91 grid cells in the X, Y, and Z directions, respectively, with lengths equal to 150 meters. The total number of grids is (5919732) in the geological model. CPI (computer-processed interpretation) for 7 wells contain (facies, porosity, water saturation, and NTG) was imported to Petrel 2016 software. Facies log was upscaled and distributed along the 3D grid. Truncated Gaussian with trend method was used to distribute the facies taking into account the conceptual facies model of the Mishrif formation. The result shows that the trend of sedimentation suggests a retrogradation pattern from NW to SE. Facies1 (Reservoir), dominated by Limestone brown to light brown, with oil shows has good distribution within the area and thinning towards the NW. The petrophysical properties (porosity, water saturation, NTG, and permeability) were distributed using the Sequential Gaussian Simulation (SIS) method and the facies model as a guide for distribution. The results show that petrophysical properties enhanced in the southeast area, representing the reef region compared to the northwest side of the study area. Unit Mishrif B had the highest porosity value and lower water saturation value along the entire field. While the units Mishrif B1, B2, and B3 show a gradual decrease in reservoir properties towards the field's southeast side. The results also show that the conceptual facies model has great benefit in constructing the 3D geological model, reflecting the geological knowledge used to correctly distribute the reservoir properties (porosity and water saturation).
The subject of an valuation of quality of construction projects is one of the topics which it becomes necessary of the absence of the quantity standards in measuring the control works and the quality valuation standards in constructional projects. In the time being it depends on the experience of the workers which leads to an apparent differences in the valuation.
The idea of this research came to put the standards to evaluate the quality of the projects in a special system depending on quantity scale nor quality specifying in order to prepare an expert system “ Crystal “ to apply this special system to able the engineers to valuate the quality of their projects easily and in more accurate ways.
Polyaniline nanofibers (PAni-NFs) have been synthesized under various concentrations (0.12, 0.16, and 0.2 g/l) of aniline and different times (2h and 3 h) by hydrothermal method at 90°C. Was conducted with the use of X-ray diffraction (XRD), Fourier Transform Infrared spectra (FTIR), Ultraviolet-Visible (UV-VIS) absorption spectra, Thermogravimetric Analysis (TGA), and Field Emission-Scanning Electron Microscopy (FE-SEM). The X-ray diffraction patterns revealed the amorphous nature of all the produced samples. FE-SEM demonstrated that Polyaniline has a nanofiber-like structure. The observed typical peaks of PAni were (1580, 1300-1240, and 821 cm-1 ), analyzed by the chemical bonding of the formed PAni through FTIR spectroscopy. Also, tests
... Show MoreIntelligent or smart completion wells vary from conventional wells. They have downhole flow control devices like Inflow Control Devices (ICD) and Interval Control Valves (ICV) to enhance reservoir management and control, optimizing hydrocarbon output and recovery. However, to explain their adoption and increase their economic return, a high level of justification is necessary. Smart horizontal wells also necessitate optimizing the number of valves, nozzles, and compartment length. A three-dimensional geological model of the As reservoir in AG oil field was used to see the influence of these factors on cumulative oil production and NPV. After creating the dynamic model for the As reservoir using the program Petrel (2017.4), we
... Show MoreThe process of stocks evaluating considered as a one of challenges for the financial analysis, since the evaluating focuses on define the current value for the cash flows which the shareholders expected to have. Due to the importance of this subject, the current research aims to choose Fama & French five factors Model to evaluate the common stocks to define the Model accuracy in Fama& French for 2014. It has been used factors of volume, book value to market value, Profitability and investment, in addition to Beta coefficient which used in capital assets pricing Model as a scale for Fama & French five factors Model. The research sample included 11 banks listed in Iraq stock market which have me
... Show MoreIn this paper, the theoretical cross section in pre-equilibrium nuclear reaction has been studied for the reaction at energy 22.4 MeV. Ericson’s formula of partial level density PLD and their corrections (William’s correction and spin correction) have been substituted in the theoretical cross section and compared with the experimental data for nucleus. It has been found that the theoretical cross section with one-component PLD from Ericson’s formula when doesn’t agree with the experimental value and when . There is little agreement only at the high value of energy range with the experimental cross section. The theoretical cross section that depends on the one-component William's formula and on-component corrected to spi
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreIris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin
... Show More