Preferred Language
Articles
/
ijcpe-946
Estimation Pore and Fracture Pressure Based on Log Data; Case Study: Mishrif Formation/Buzurgan Oilfield at Iraq
...Show More Authors

Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pressure gradient and clay volume, which were also established first, data such as gamma ray, density, resistivity, and sonic log data are also required. A key consideration in the design of certain wells is the forecasting of fracture pressure for wells drilled in the southern Iraqi oilfield of Buzurgan. The pressure abnormality is found in MA, MB21, MC1 and MC2 units by depending on pore pressures calculated from resistivity log. In these units, depths and its equivalent normal and abnormal pressure are detected for all sex selected wells; BUCS-47, BUCS-48, BUCS-49, BUCN-43, BUCN-51 and BBCN-52. For MA, MB21, MC1, and MC2 units, the highest difference in pore pressure values are 1698 psi @ 3750 m (BUCN-51), 3420 psi @ 3900 m (BUCN-51), 788 psi @ 3980 m (BUCS-49), and 5705 psi @ 4020 m (BUCN-52). On other hands, MB11 and MB12 units have normal pressure trend in all studied wells. Finally, the results show that the highest pore and fracture pressure values is existed in North dome, in comparison with that obtained in south dome of Mishrif reservoir at Buzurgan oilfield.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Fri Jul 01 2011
Journal Name
Engineering And Technology Journal
Off-Line Arabic Signature Recognition Based on Invariant Moments Properties
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
...Show More Authors

Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2009
Journal Name
2009 Ieee Symposium On Industrial Electronics & Applications
ITTW: T-way minimization strategy based on intersection of tuples
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Performance of humidity sensor based on photonic crystal fiber interferometer
...Show More Authors

Photonic Crystal Fiber Interferometers (PCFIs) are greatly used
for sensing applications. This work presents the fabrication and
characterization of a relative humidity sensor based on Mach-
Zehnder Interferometer (MZI), which operates in reflection mode.
The humidity sensor operation based on the adsorption and
desorption of water vapour at the silica-air interface within the PCF.
The fabrication of this sensor is simple, it only includes splicing and
cleaving the PCF with SMF.PCF (LMA-10) with a certain length
spliced to SMF (Corning-28).
The spectrum of PCFI exhibits good sensitivity to humidity
variations. The PCFI response is observed for a range of humidity
values from (27% RH to 85% RH), the positi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (17)
Crossref (4)
Scopus Crossref
Publication Date
Sat Apr 09 2016
Journal Name
Photonic Sensors
Parametric Analysis of NO2 Gas Sensor Based on Carbon Nanotubes
...Show More Authors

View Publication
Scopus (35)
Crossref (34)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Chemical Sensor Based on a Hollow-Core Photonic Crystal Fiber
...Show More Authors

In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.

View Publication Preview PDF