In many oil fields only the BHC logs (borehole compensated sonic tool) are available to provide interval transit time (Δtp), the reciprocal of compressional wave velocity VP.
To calculate the rock elastic or inelastic properties, to detect gas-bearing formations, the shear wave velocity VS is needed. Also VS is useful in fluid identification and matrix mineral identification.
Because of the lack of wells with shear wave velocity data, so many empirical models have been developed to predict the shear wave velocity from compressional wave velocity. Some are mathematical models others used the multiple regression method and neural network technique.
In this study a number of em
... Show MoreFracture pressure gradient prediction is complementary in well design and it is must be considered in selecting the safe mud weight, cement design, and determine the optimal casing seat to minimize the common drilling problems. The exact fracture pressure gradient value obtained from tests on the well while drilling such as leak-off test, formation integrity test, cement squeeze ... etc.; however, to minimize the total cost of drilling, there are several methods could be used to calculate fracture pressure gradient classified into two groups: the first one depend on Poisson’s ratio of the rocks and the second is fully empirical methods. In this research, the methods selected are Huubert and willis, Cesaroni I, Cesaroni II,
... Show MoreThe reduction in the rivers capacity is one the most important issue to give the decision maker an idea during the flood season. The study area included the rivers of the Al Atshan, Al Sabeel and Euphrates, which are surveyed with a length of 21, 5 and 20 km respectively. The Euphrates , the Atshan and Al Sabeel rivers were simulated by using HEC-RAS 5.0.3 software to study the real condition within the city of Assamawa. As well as the simulation was implemented by modifying the cross sections of the Euphrates and Al Sabeel rivers to increase their capacity to 1300 and 1200 m3/s respectively which are a flood discharges100 year return periods. The results showed that the maximum discharge capacity under real conditions o
... Show MoreThe present paper includes a study of color variation in Iraqi Collared dove Streptopelia decaocto. Three different populations have been recognized: the southern population which belongs to the Indian race, the northern population to the Eurasian race; the dark and light color variation occurs in the Baghdad population because of hybridisation between the two races, found infected with two cestodes, Raillietina echinobothrida found in most of our specimens, while the dark face found beside R. echinobothrida infected with Idiogenes sp. getting it probably from vertebrate sources. We believe that most of the Baghdad population was intermediate between north and south races.
... Show MoreColor is one of the most important elements involved and contributing mainly to designs and visual works, whether they are fixed or mobile, for internal spaces through what color gives it the possibilities on the physical and intellectual level, if the process is linked to the functional performance or the aesthetic value, which is thus included within the system of processors and basic works in Designing the interior spaces and highlighting the functional and aesthetic aspects of them through the executed designs that are linked to certain techniques and mechanisms. Therefore, they are processed according to the references and pressure structures or the creation and modern dealing with materials and designs to implement operations in hi
... Show MoreThe sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.
<span>Digital audio is required to transmit large sizes of audio information through the most common communication systems; in turn this leads to more challenges in both storage and archieving. In this paper, an efficient audio compressive scheme is proposed, it depends on combined transform coding scheme; it is consist of i) bi-orthogonal (tab 9/7) wavelet transform to decompose the audio signal into low & multi high sub-bands, ii) then the produced sub-bands passed through DCT to de-correlate the signal, iii) the product of the combined transform stage is passed through progressive hierarchical quantization, then traditional run-length encoding (RLE), iv) and finally LZW coding to generate the output mate bitstream.
... Show MoreEnergy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the
... Show MoreA new algorithm is proposed to compress speech signals using wavelet transform and linear predictive coding. Signal compression based on the concept of selecting a small number of approximation coefficients after they are compressed by the wavelet decomposition (Haar and db4) at a suitable chosen level and ignored details coefficients, and then approximation coefficients are windowed by a rectangular window and fed to the linear predictor. Levinson Durbin algorithm is used to compute LP coefficients, reflection coefficients and predictor error. The compress files contain LP coefficients and previous sample. These files are very small in size compared to the size of the original signals. Compression ratio is calculated from the size of th
... Show More