The Middle Cenomanian-Early Turonian Mishrif Formation includes important carbonate reservoirs in Iraq and some other surrounding countries due to their high reservoir quality and wide geological extension. The 2D models of this study for facies, effective porosity and water saturation indicate the vertical and lateral heterogeneity of the Mishrif Formation reservoir properties in the Majnoon oil field. Construction of 2D reservoir model of the Mishrif Formation to explain the distribution of facies and petrophysical properties (effective porosity and water saturation) by using RockWorks software. The increase of effective porosity is attributed to the presence of shoal facies.The high water saturation is attributed to the existence of rest
... Show MoreThe risk assessment for three pipelines belonging to the Basra Oil Company (X1, X2, X3), to develop an appropriate risk mitigation plan for each pipeline to address all high risks. Corrosion risks were assessed using a 5 * 5 matrix. Now, the risk assessment for X1 showed that the POF for internal corrosion is 5, which means that its risk is high due to salinity and the presence of CO, H2S and POF for external corrosion is 1 less than the corrosion, while for Flowline X2 the probability of internal corrosion is 4 and external is 4 because there is no Cathodic protection applied due to CO2, H2S and Flowline X3 have 8 leaks due to internal corrosion so the hazard rating was very high 5 and could be due to salinity, CO2, fluid flow rate
... Show MoreReflective cracking is one of the primary forms of deterioration in pavements. It is widespread when Asphalt concrete (AC) overlays are built over a rigid pavement with discontinuities on its surface. Thus, this research work aims to reduce reflection cracks in asphalt concrete overlay on the rigid pavement. Asphalt Concrete (AC) slab specimens were prepared in three thicknesses (4, 5, and 6 cm). All these specimens were by testing machine designed and manufactured at the Engineering Consulting Office of the University of Baghdad to examine for the number of cycles and loads needed to propagate the reflection cracking in the asphalt concert mixture at three temperatures (20, 30, and 30°C). It was noticed that the higher thickness A
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreWe present the notion of bipolar fuzzy k-ideals with thresholds (
Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag
... Show MoreA binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the
... Show More