Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pressure gradient and clay volume, which were also established first, data such as gamma ray, density, resistivity, and sonic log data are also required. A key consideration in the design of certain wells is the forecasting of fracture pressure for wells drilled in the southern Iraqi oilfield of Buzurgan. The pressure abnormality is found in MA, MB21, MC1 and MC2 units by depending on pore pressures calculated from resistivity log. In these units, depths and its equivalent normal and abnormal pressure are detected for all sex selected wells; BUCS-47, BUCS-48, BUCS-49, BUCN-43, BUCN-51 and BBCN-52. For MA, MB21, MC1, and MC2 units, the highest difference in pore pressure values are 1698 psi @ 3750 m (BUCN-51), 3420 psi @ 3900 m (BUCN-51), 788 psi @ 3980 m (BUCS-49), and 5705 psi @ 4020 m (BUCN-52). On other hands, MB11 and MB12 units have normal pressure trend in all studied wells. Finally, the results show that the highest pore and fracture pressure values is existed in North dome, in comparison with that obtained in south dome of Mishrif reservoir at Buzurgan oilfield.
The present study was conducted in the Tigris River within Baghdad (University of Baghdad campus). The study included some physicochemical parameters and qualitative of epiphytic algae on the host plant (Ceratophyllum demersum) during summer season 2013. The results revealed that the study area was alkaline, hard and oxygenated water. A total of 105 taxa of epiphytic algae was identified. Bacillariophyceae diatoms composed 44.7% of the total and were represented by 42.4% of the order Pennales and 1.9 %of the order Centrales. Chlorophyceae composed 32.3%, followed by Cyanophyceae composed 22.8 % of the total. The total number of epiphytic algae was fluctuated among the study period. Most of the identified algae were benthos type and a few
... Show MoreThis study is an approach to assign the land area of Kirkuk city [ a city located in the northern of Iraq, 236 kilometers north of Baghdad and 83 kilometers south of Erbil [ Climatic atlas of Iraq, 1941-1970 ] into different multi zones by using Satellite image and Arc Map10.3, zones of different traffic noise pollutions. Land zonings process like what achieved in this paper will help and of it’s of a high interest point for the future of Kirkuk city especially urban
... Show MoreEstimation the unknown parameters of a two-dimensional sinusoidal signal model is an important and a difficult problem , The importance of this model in modeling Symmetric gray- scale texture image . In this paper, we propose employment Deferential Evaluation algorithm and the use of Sequential approach to estimate the unknown frequencies and amplitudes of the 2-D sinusoidal components when the signal is affected by noise. Numerical simulation are performed for different sample size, and various level of standard deviation to observe the performance of this method in estimate the parameters of 2-D sinusoidal signal model , This model was used for modeling the Symmetric gray scale texture image and estimating by using
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreAuthentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreThe fetal heart rate (FHR) signal processing based on Artificial Neural Networks (ANN),Fuzzy Logic (FL) and frequency domain Discrete Wavelet Transform(DWT) were analysis in order to perform automatic analysis using personal computers. Cardiotocography (CTG) is a primary biophysical method of fetal monitoring. The assessment of the printed CTG traces was based on the visual analysis of patterns that describing the variability of fetal heart rate signal. Fetal heart rate data of pregnant women with pregnancy between 38 and 40 weeks of gestation were studied. The first stage in the system was to convert the cardiotocograghy (CTG) tracing in to digital series so that the system can be analyzed ,while the second stage ,the FHR time series was t
... Show MoreThe quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.
FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic
... Show MoreAuthentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi