Building a 3D geological model from field and subsurface data is a typical task in
geological studies involving natural resource evaluation and hazard assessment. In
this paper a 3D geological model for Asmari Reservoir in Fauqi oil field has been
built using petrel software. Asmari Reservoir belongs to (Oligocene- Lower
Miocene), it represents the second reservoir products after Mishrif Reservoir in Fauqi
field. Five wells namely FQ6, FQ7, FQ15, FQ20, FQ21 have been selected lying in
Missan governorate in order to build Structural and petrophysical (porosity and water
saturation) models represented by a 3D static geological model in three directions
.Structural model shows that Fauqi oil field represents un cylindrical anticlinal fold
which contains number of culminations at northern and southern parts separated by
depressions. After making zones for Asmari reservoir, which is divided into 4 zones
(Jeribe/ Euphrates and Kirkuk group which includes Upper Kirkuk, Buzurgan
member, Lower and Middle Kirkuk) , Layers are built for each zone of Asmari
reservoir depending on petrophysical properties. Petrophysical models (porosity and
water saturation) have been constructed for each zone of Asmari reservoir using
random function simulation algorithm. According to data analyses and the results
from modeling, the Upper Kirkuk zone which divided into five layers is a good
reservoir unit regarding its good petrophysical properties (high porosity and low water
saturation) with high presence of oil in economic quantities. Cross sections of porosity
model and water saturation model were built to illustrate the vertical and horizontal
distribution of petrophysical properties between wells of Fauqi oil field.
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreAspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.
Many geophysical methods have been applied to locate groundwater in Nigeria’s rural and urban villages. Locating groundwater in low permeability formations like shales and siltstones is even more challenging due to the difficulty of mapping fracture zones within these formations. The fracture zones serve as potential aquifers in low permeability formations and have been the object of groundwater search in shales, siltstones and other low permeability formations. The electrical resistivity method has proven helpful in fracture mapping within low permeability formations due to the existing resistivity contrast usually observed between the fractured and non-fractured sections in the Shales and Siltstones. Three vertical electri
... Show MoreThe wind atlas analysis and application program, WAsP, is used to assess wind
energy potential، wind climate from geostrophic winds of a given area. In this paper,
metrological data from Ali Algharby station was used to predict the wind resource
and wind turbine energy production at Ali Algharby site.
Data from metrological station was used to draw up observed wind climates at the
anemometer site. Site contour map was digitized using WAsP Map Editortool.
Observed wind climate, digitized contour map, terrain roughness length, obstacle
groups and their porosity were used as input to the WAsP model. Vestas V182, 1.65
MW turbine was used. Weibull probability distribution graph of wind speed, power
density were dra
Artificial lift techniques are a highly effective solution to aid the deterioration of the production especially for mature oil fields, gas lift is one of the oldest and most applied artificial lift methods especially for large oil fields, the gas that is required for injection is quite scarce and expensive resource, optimally allocating the injection rate in each well is a high importance task and not easily applicable. Conventional methods faced some major problems in solving this problem in a network with large number of wells, multi-constrains, multi-objectives, and limited amount of gas. This paper focuses on utilizing the Genetic Algorithm (GA) as a gas lift optimization algorit
Iraq territory as a whole and south of Iraq in particular encountered rapid desertification and signs of severe land degradation in the last decades. Both natural and anthropogenic factors are responsible for the extent of desertification. Remote sensing data and image analysis tools were employed to identify, detect, and monitor desertification in Basra governorate. Different remote sensing indicators and image indices were applied in order to better identify the desertification development in the study area, including the Normalized difference vegetation index (NDVI), Normalized Difference Water Index (NDWI), Salinity index (SI), Top Soil Grain Size Index (GSI) , Land Surface Temperature (LST) , Land Surface Soil Moisture (LSM), and La
... Show MoreThe software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show MoreThe origin of this technique lies in the analysis of François Kenai (1694-1774), the leader of the School of Naturalists, presented in Tableau Economique. This method was developed by Karl Marx in his analysis of the Departmental Relationships and the nature of these relations in the models of " "He said. The current picture of this type of economic analysis is credited to the Russian economist Vasily Leontif. This analytical model is commonly used in developing economic plans in developing countries (p. 1, p. 86). There are several types of input and output models, such as static model, mobile model, regional models, and so on. However, this research will be confined to the open-ended model, which found areas in practical application.
... Show More