Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pressure gradient and clay volume, which were also established first, data such as gamma ray, density, resistivity, and sonic log data are also required. A key consideration in the design of certain wells is the forecasting of fracture pressure for wells drilled in the southern Iraqi oilfield of Buzurgan. The pressure abnormality is found in MA, MB21, MC1 and MC2 units by depending on pore pressures calculated from resistivity log. In these units, depths and its equivalent normal and abnormal pressure are detected for all sex selected wells; BUCS-47, BUCS-48, BUCS-49, BUCN-43, BUCN-51 and BBCN-52. For MA, MB21, MC1, and MC2 units, the highest difference in pore pressure values are 1698 psi @ 3750 m (BUCN-51), 3420 psi @ 3900 m (BUCN-51), 788 psi @ 3980 m (BUCS-49), and 5705 psi @ 4020 m (BUCN-52). On other hands, MB11 and MB12 units have normal pressure trend in all studied wells. Finally, the results show that the highest pore and fracture pressure values is existed in North dome, in comparison with that obtained in south dome of Mishrif reservoir at Buzurgan oilfield.
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreChacha 20 is a stream cypher that is used as lightweight on many CPUs that do not have dedicated AES instructions. As stated by Google, that is the reason why they use it on many devices, such as mobile devices, for authentication in TLS protocol. This paper proposes an improvement of chaha20 stream cypher algorithm based on tent and Chebyshev functions (IChacha20). The main objectives of the proposed IChacha20 algorithm are increasing security layer, designing a robust structure of the IChacha20 to be enabled to resist various types of attacks, implementing the proposed algorithm for encryption of colour images, and transiting it in a secure manner. The test results proved that the MSE, PSNR, UQI and NCC metrics
... Show MoreSpeech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R
... Show MoreIn this paper an accurate Indian handwritten digits recognition system is
proposed. The system used three proposed method for extracting the most effecting
features to represent the characteristic of each digit. Discrete Wavelet Transform
(DWT) at level one and Fast Cosine Transform (FCT) is used for features extraction
from the thinned image. Besides that, the system used a standard database which is
ADBase database for evaluation. The extracted features were classified with KNearest
Neighbor (KNN) classifier based on cityblock distance function and the
experimental results show that the proposed system achieved 98.2% recognition
rate.
Objective the research is to identify Over the Commitment of a Rushed Bank in Baghdad has applied social responsibility in accordance with ISO 26000 by measuring and diagnosing the gap between the actual reality in the bank and the requirements of the standard.
Objective: To evaluate the functional outcome of percutaneous cross two K wires fixation for Gartland types II and III fractures of humerus. Methodology: This prospective study included80 patients with supracondylar humeral fracture, who underwent closed reduction and fixation by two crossed Kirschner wires. We included children with age < 15 years with closed fractures with Gartland types II and III, while the patient with vascular injury, open, irreducible fractures were excluded. The patients were following up for 6 months and assessed functionally by Flynn’s criteria. Results: The mean age of patients was 8.1 years. Trauma while child playing was the main mechanism of injury in 43 (59.8%) children and 46 (57.5%) fractures were of the
... Show MoreIn Iraq, government contributions to the public companies have become a very important aspect which contributes to the survival and sustainability of these institutions as it consider one of the main sources of funding, if not it consider the basis of funding.
According to the vital roles assigned to these institutions to follow up, which usually include important activities in the national economy, the research focused on studying the field reality of the method used in evaluating the stock of total production and purchases of goods for the purpose of selling the strategic commodities of the General Company for Grain Trade. As a result, the aim of this study came to came to highlight&n
... Show MoreThe aim of the research is to know the level of time management application and its impact on the performance of the job, a survey search in the general company for communication and information technology and provide recommendations that help employees to optimize the use of time and improve performance, which is an important element in controlling the various functions of the company. In order to achieve the objectives of the research, the questionnaire was based on two main variables and distributed to a random sample of (44) employees in the company out of (308) employees, thus the proportion of the sample (14%). After collecting the samples from the sample, there are (6) incomplete forms that have been retri
... Show More