Porosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in resulting binary image. This paper presents the possibilities of using image processing for determining digital 2D rock samples porosity in carbonate reservoir rocks. MATLAB code created which automatically segment and determine the digital rock porosity, based on the OTSU's thresholding algorithm. In this work, twenty-two samples of 2D thin section petrographic image reservoir rocks of one Iraqi oil field are studied. The examples of thin section images are processed and digitized, utilizing MATLAB programming. In the present study, we have focused on determining of micro and macroporosity of the digital image. Also, some pore void characteristics, such as area and perimeter, were calculated. Digital 2D image analysis results are compared to laboratory core investigation results to determine the strength and restrictions of the digital image interpretation techniques. Thin microscopic image porosity determined using OTSU technique showed a moderate match with core porosity.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThis study aims mainly to identify the role of the use of blockchain technology in improving the quality of digital financial reports, answering questions and testing the hypothesis of the study, the researchers relied on the descriptive analytical approach, and to obtain the necessary data a questionnaire was distributed after evaluation to the study community.
The results of the study have shown that the use of blockchain technology helps to provide a high degree of reliability in digital financial reports published to banks over the Internet, ensure the speed of completion and completion, and maintain the privacy and confidentiality of the information contained in the digital financial reports of banks
... Show MoreEstimation of mechanical and physical rock properties is an essential issue in applications related to reservoir geomechanics. Carbonate rocks have complex depositional environments and digenetic processes which alter the rock mechanical properties to varying degrees even at a small distance. This study has been conducted on seventeen core plug samples that have been taken from different formations of carbonate reservoirs in the Fauqi oil field (Jeribe, Khasib, and Mishrif formations). While the rock mechanical and petrophysical properties have been measured in the laboratory including the unconfined compressive strength, Young's modulus, bulk density, porosity, compressional and shear -waves, well logs have been used to do a compar
... Show MoreThe security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show MoreImage retrieval is used in searching for images from images database. In this paper, content – based image retrieval (CBIR) using four feature extraction techniques has been achieved. The four techniques are colored histogram features technique, properties features technique, gray level co- occurrence matrix (GLCM) statistical features technique and hybrid technique. The features are extracted from the data base images and query (test) images in order to find the similarity measure. The similarity-based matching is very important in CBIR, so, three types of similarity measure are used, normalized Mahalanobis distance, Euclidean distance and Manhattan distance. A comparison between them has been implemented. From the results, it is conclud
... Show MoreMagnetic Resonance Imaging (MRI) is one of the most important diagnostic tool. There are many methods to segment the
tumor of human brain. One of these, the conventional method that uses pure image processing techniques that are not preferred because they need human interaction for accurate segmentation. But unsupervised methods do not require any human interference and can segment the brain with high precision. In this project, the unsupervised classification methods have been used in order to detect the tumor disease from MRI images. These metho
... Show MoreThe present work includes design, construction and operates of a prototype solar absorption refrigeration system, using methanol as a refrigerant to avoid any refrigerant that cause global warming and greenhouse effect. Flat plate collector was used because it’s easy, ninexpensive and efficient. Many test runs (more than 50) were carried out on the system from May to October, 2013; the main results were taken between the period of July 15, 2013 to August 15, 2013 to find the maximum C.O.P, cooling, temperature and pressure of the system. The system demonstrates a maximum generator temperature of 93.5 oC, on July 18, 2013 at 2:30 pm, and the average mean generator temperature Tgavr was 74.7 °C, for this period. The maximum pressure Pg
... Show MoreThe strong cryptography employed by PGP (Pretty Good Privacy) is one of the best available today. The PGP protocol is a hybrid cryptosystem that combines some of the best features of both conventional and public-key cryptography. This paper aim to improve PGP protocol by combined between the Random Genetic algorithm, NTRU (N-th degree Truncated polynomial Ring Unit) algorithm with PGP protocol stages in order to increase PGP protocol speed, security, and make it more difficult in front of the counterfeiter. This can be achieved by use the Genetic algorithm that only generates the keys according to the Random Genetic equations. The final keys that obtained from Genetic algorithm were observed to be purely random (according to the randomne
... Show MoreThe process of risk assessment in the build-operate transfer (BOT) project is very important to identify and analyze the risks in order to make the appropriate decision to respond to them. In this paper, AHP Technique was used to make the appropriate decision regarding response to the most prominent risks that were generated in BOT projects, which includes a comparison between the criteria for each risk as well as the available alternatives and by mathematical methods using matrices to reach an appropriate decision to respond to each risk.Ten common risks in BOT contracts are adopted for analysis in this paper, which is grouped into six main risk headings.The procedures followed in this paper are the questionnaire method
... Show More