Preferred Language
Articles
/
ijs-10026
Building A 3D Geological model Using Petrel Software for Asmari Reservoir, South Eastern Iraq
...Show More Authors

Building a 3D geological model from field and subsurface data is a typical task in
geological studies involving natural resource evaluation and hazard assessment. In
this paper a 3D geological model for Asmari Reservoir in Fauqi oil field has been
built using petrel software. Asmari Reservoir belongs to (Oligocene- Lower
Miocene), it represents the second reservoir products after Mishrif Reservoir in Fauqi
field. Five wells namely FQ6, FQ7, FQ15, FQ20, FQ21 have been selected lying in
Missan governorate in order to build Structural and petrophysical (porosity and water
saturation) models represented by a 3D static geological model in three directions
.Structural model shows that Fauqi oil field represents un cylindrical anticlinal fold
which contains number of culminations at northern and southern parts separated by
depressions. After making zones for Asmari reservoir, which is divided into 4 zones
(Jeribe/ Euphrates and Kirkuk group which includes Upper Kirkuk, Buzurgan
member, Lower and Middle Kirkuk) , Layers are built for each zone of Asmari
reservoir depending on petrophysical properties. Petrophysical models (porosity and
water saturation) have been constructed for each zone of Asmari reservoir using
random function simulation algorithm. According to data analyses and the results
from modeling, the Upper Kirkuk zone which divided into five layers is a good
reservoir unit regarding its good petrophysical properties (high porosity and low water
saturation) with high presence of oil in economic quantities. Cross sections of porosity
model and water saturation model were built to illustrate the vertical and horizontal
distribution of petrophysical properties between wells of Fauqi oil field.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Aquifer depth determination of low permeability layers using geo-resistivity data: A case study of Enyigba mine area and environs, South Eastern Nigeria
...Show More Authors

      Many geophysical methods have been applied to locate groundwater in Nigeria’s rural and urban villages. Locating groundwater in low permeability formations like shales and siltstones is even more challenging due to the difficulty of mapping fracture zones within these formations. The fracture zones serve as potential aquifers in low permeability formations and have been the object of groundwater search in shales, siltstones and other low permeability formations. The electrical resistivity method has proven helpful in fracture mapping within low permeability formations due to the existing resistivity contrast usually observed between the fractured and non-fractured sections in the Shales and Siltstones. Three vertical electri

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Wind Resource Estimation and Mapping at Ali Al-Gharby Site (East-South of Iraq) Using WAsP Model
...Show More Authors

The wind atlas analysis and application program, WAsP, is used to assess wind
energy potential، wind climate from geostrophic winds of a given area. In this paper,
metrological data from Ali Algharby station was used to predict the wind resource
and wind turbine energy production at Ali Algharby site.
Data from metrological station was used to draw up observed wind climates at the
anemometer site. Site contour map was digitized using WAsP Map Editortool.
Observed wind climate, digitized contour map, terrain roughness length, obstacle
groups and their porosity were used as input to the WAsP model. Vestas V182, 1.65
MW turbine was used. Weibull probability distribution graph of wind speed, power
density were dra

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 09 2021
Journal Name
Abu Dhabi International Petroleum Exhibition & Conference
Numerical Simulation of Gas Lift Optimization Using Artificial Intelligence for a Middle Eastern Oil Field
...Show More Authors
Abstract<p>Artificial lift techniques are a highly effective solution to aid the deterioration of the production especially for mature oil fields, gas lift is one of the oldest and most applied artificial lift methods especially for large oil fields, the gas that is required for injection is quite scarce and expensive resource, optimally allocating the injection rate in each well is a high importance task and not easily applicable. Conventional methods faced some major problems in solving this problem in a network with large number of wells, multi-constrains, multi-objectives, and limited amount of gas. This paper focuses on utilizing the Genetic Algorithm (GA) as a gas lift optimization algorit</p> ... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
A Study of Desertification Using Remote Sensing Techniques in Basra Governorate, South Iraq
...Show More Authors

Iraq territory as a whole and south of Iraq in particular encountered rapid desertification and signs of severe land degradation in the last decades. Both natural and anthropogenic factors are responsible for the extent of desertification. Remote sensing data and image analysis tools were employed to identify, detect, and monitor desertification in Basra governorate. Different remote sensing indicators and image indices were applied in order to better identify the desertification development in the study area, including the Normalized difference vegetation index (NDVI), Normalized Difference Water Index (NDWI), Salinity index (SI), Top Soil Grain Size Index (GSI) , Land Surface Temperature (LST) , Land Surface Soil Moisture (LSM), and La

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Fri Mar 27 2020
Journal Name
Solid State Technology
Seepage and Slope Stability Analysis for Hemrin Earth Dam in Iraq Using Geo-Studio Software
...Show More Authors

View Publication
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Apr 24 2020
Journal Name
Modeling Earth Systems And Environment
Assessment of reservoir properties and Buckles model for Rumaila Formation in Ahdeb oil field, Central Iraq
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon May 21 2007
Journal Name
Journal Of Planner And Development
Using the Input - Output Model in building the economic plan using the computer
...Show More Authors

The origin of this technique lies in the analysis of François Kenai (1694-1774), the leader of the School of Naturalists, presented in Tableau Economique. This method was developed by Karl Marx in his analysis of the Departmental Relationships and the nature of these relations in the models of " "He said. The current picture of this type of economic analysis is credited to the Russian economist Vasily Leontif. This analytical model is commonly used in developing economic plans in developing countries (p. 1, p. 86). There are several types of input and output models, such as static model, mobile model, regional models, and so on. However, this research will be confined to the open-ended model, which found areas in practical application.

... Show More
View Publication Preview PDF