Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pressure gradient and clay volume, which were also established first, data such as gamma ray, density, resistivity, and sonic log data are also required. A key consideration in the design of certain wells is the forecasting of fracture pressure for wells drilled in the southern Iraqi oilfield of Buzurgan. The pressure abnormality is found in MA, MB21, MC1 and MC2 units by depending on pore pressures calculated from resistivity log. In these units, depths and its equivalent normal and abnormal pressure are detected for all sex selected wells; BUCS-47, BUCS-48, BUCS-49, BUCN-43, BUCN-51 and BBCN-52. For MA, MB21, MC1, and MC2 units, the highest difference in pore pressure values are 1698 psi @ 3750 m (BUCN-51), 3420 psi @ 3900 m (BUCN-51), 788 psi @ 3980 m (BUCS-49), and 5705 psi @ 4020 m (BUCN-52). On other hands, MB11 and MB12 units have normal pressure trend in all studied wells. Finally, the results show that the highest pore and fracture pressure values is existed in North dome, in comparison with that obtained in south dome of Mishrif reservoir at Buzurgan oilfield.
Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.
In this research a proposed technique is used to enhance the frame difference technique performance for extracting moving objects in video file. One of the most effective factors in performance dropping is noise existence, which may cause incorrect moving objects identification. Therefore it was necessary to find a way to diminish this noise effect. Traditional Average and Median spatial filters can be used to handle such situations. But here in this work the focus is on utilizing spectral domain through using Fourier and Wavelet transformations in order to decrease this noise effect. Experiments and statistical features (Entropy, Standard deviation) proved that these transformations can stand to overcome such problems in an elegant way.
... Show MoreFeatures is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.
Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover
... Show MoreThe study included the determination of pollen grains features for 8 genera and 13 taxa of Mimosoideae subfamily grown in Baghdad/ Iraq by using each of light and scanning electron microscope. The samples of taxa were collected from various sites in Baghdad province in central Iraq located on 32 45° 0-33 45 0 N and 44 0 0- 44° 45 0 E. the results from this study revealed different pollen types as monad in each of Leucaena, Prosopis, and Neltuma, tetrad in Mimosa and polyads in Acacia, Albizia, Calliandra, Pithecellobium and Vachellia. Each taxa of these genera characterized by special palynological features as shape, size, number of polyads grain and conplateuration as well as other parameters included other dimensions, and these
... Show MoreThe spread of drugs in Iraq during the period 1932-1968 was one of the most dangerous. phenomena affecting humans, as it leads to addiction, to the point where people cannot live without it, it also leads to the destruction of the user's nerves and body, and the inability to maintain balance, or even perform daily tasks. There are different types of drugs, and the side effects vary from one type to another However in all cases, drugs remain the scourge of the world, They are a toxic substance that attacks the nerves and tries to destroy them' The importance of the subject lies in the fact that it is anew and unstudied topic, and it studies a phenomenon that affects humanity in general and Iraq in Particular through it light can be shed on t
... Show MoreI came back and made my jewelery from the first research or studies known to man, and the oldest era and confirmed the problem of searching for the links of sweets and admiration of the magnificence of the effectiveness of the search for the importance of preserving the heritage of the Iraqi civilization in its original creative aspects. Metal in Iraq, Head Costume, Neck Costume, Party Costume (Hands and Legs). The main results of the research were;
1-Contemporary folk jewelry in Iraq was characterized by design units for use.
Dependence in the feed industry in the form of laboratory mold.
Background: Joubert syndrome (JS) is a very rare autosomal recessive disorder characterized by agenesis of cerebellar vermis, abnormal eye movements, respiratory irregularities, and delayed generalized motor development. Retinal dystrophy and cystic kidneys may also be associated with this clinical syndrome. The importance of recognizing JS is related to the outcome and its potential complications. This syndrome is difficult to diagnose clinically because of its variable phenotype. Its neuroimaging hallmarks include the characteristic molar tooth sign and bat wing-shaped fourth ventricle
Different ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach