Preferred Language
Articles
/
ijs-364
Integration of Seismic Facies and Seismic Sequence analysis for Depositional Environment Reconstruction of nandy Field, Niger Delta

An integrated seismic sequence stratigraphy and facies analysis has been carried out with a view to understanding the depositional environment and stratal stacking pattern of Nandy Field of Niger Delta. Well logs and biostratigraphic information were used to identify the lithologies, stratal stacking patterns, stratigraphic surfaces, system tracts and reservoir potentials of the field. Seismic sequence stratigraphy and seismic reflection patterns were used to identify the seismic facies. Facies-related attributes were employed to identify the continuity and amplitude of seismic events. Three seismic facies packages and three reservoir sands were identified. The environments of deposition of the area consist of marginal marine to continental depositional settings predominantly made of shoreface deposits with few channel sands. The depositional model of the area shows that the deposition went down the axis of fluvial depositional system, which transports sediments through channels down to the shelf into the base of the slope down the basin. The seismic reflection patterns in this field are parallel to divergent reflections, high-continuity and high-amplitude facies, low-amplitude facies, low-continuity and variable-amplitude reflections, chaotic reflections and wavy reflection patterns. The seismic stratigraphic analysis of this field revealed the presence of low stand system tract (LST), high stand system tract (HST) and transgressive system tract (TST). Sands 1 and 2 were delineated within high stand systems tract (HST) while sand 3 was within low stand systems tract (LST). The results of this study show that the Nandy Field was of high hydrocarbon potentials and highlight the importance of using seismic reflection parameters (reflection configuration, amplitude, frequency and continuity) in the division and classification of seismic facies.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
DEO: A Dynamic Event Order Strategy for t-way Sequence Covering Array Test Data Generation

Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of cove

... Show More
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Stochastic Non-Linear Pseudo-Random Sequence Generator

Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence

Crossref
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
Iraq after war and strategy of reconstruction : Analytical study in reality and future horizon

Abstract (Iraq post – war reconstruction strategy: analytical study in fact and future prospects.) There search aims at identifying the causes of internal instability in Iraq from the political ,economic , social and security aspects , to diagnose the imbalance and to work towards finding real solutions to this . The study also aims at identifying the reconstruction proposals to completely eliminate the organizationof the terrorist advocate, as well as to know. theproblem of research lies in the ability of Iraqi political elites to achieve internal stability and to employ reconstruction proposals at all levels . The hypothesis of the research lies in the equation that the process of building stability (political – economic)and (socia

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Apr 07 2023
Journal Name
Multidisciplinary International Journal
INTEGRATION BETWEEN LANGUAGE AND LITERATURE OVER TEACHING OF FOREIGN LANGUAGES

PDBN Rashid, Multidisciplinary International Journal, 2023

View Publication
Publication Date
Sat Nov 10 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Clinical Learning and Training Environment for Maternal and Child Health Nursing Students

Objective: To assess the clinical learning environment and clinical training for students' in maternal and child
health nursing.
Methodology: A descriptive study was conducted on non probability sample (purposive) of (175) students' in
Nursing College/ University of Baghdad for the period of June 19th to July 18th 2013. A questionnaire was used as a
tool of data collection to fulfill with objective of the study and consisted of three parts, including demographic,
clinical learning environment and clinical training for students' in maternal and child health nursing. Descriptive
statistical analyses were used to analyze the data.
Results: The results of the study revealed that the 65.1% of student at age which ranged b

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 26 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Dual use of Altman financial failure prediction analysis and stress tests to achieve integration in banking risk management : Analytical study of the National Bank of Iraq

The research aims to demonstrate the dual use of analysis to predict financial failure according to the Altman model and stress tests to achieve integration in banking risk management. On the bank’s ability to withstand crises, especially in light of its low rating according to the Altman model, and the possibility of its failure in the future, thus proving or denying the research hypothesis, the research reached a set of conclusions, the most important of which (the bank, according to the Altman model, is threatened with failure in the near future, as it is located within the red zone according to the model’s description, and will incur losses if it is exposed to crises in the future according to the analysis of stress tests

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
Human Dynamic Behavior: Reconstruction Trajectories Using CDRs
Abstract<p>Investigating the human mobility patterns is a highly interesting field in the 21th century, and it takes vast attention from multi-disciplinary scientists in physics, economic, social, computer, engineering…etc. depending on the concept that relates between human mobility patterns and their communications. Hence, the necessity for a rich repository of data has emerged. Therefore, the most powerful solution is the usage of GSM network data, which gives millions of Call Details Records gained from urban regions. However, the available data still have shortcomings, because it gives only the indication of spatio-temporal data at only the moment of mobile communication activities. In th</p> ... Show More
Scopus Crossref
View Publication
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Object Reconstruction From Fourier Magnitude Information Only

Reconstruction an object from its Fourier magnitude has taken a great deal in the literature and there is still no obvious solution for the failure of this algorithm. In this paper, the frequent failure of the phase retrieval is discussed in details and it has been shown that when the object is cento-symmetric, the object support is vital element to ensure uniqueness while for asymmetric object; the asymmetric support of the object is not enough to ensure uniqueness but the reconstruction appear to include most of the information of the original object. This is also true for the reconstruction of a complex function.

View Publication Preview PDF
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Comparative Permeability Estimation Method and Identification of Rock Types using Cluster Analysis from Well Logs and Core Analysis Data in Tertiary Carbonate Reservoir-Khabaz Oil Field

Characterization of the heterogonous reservoir is complex representation and evaluation of petrophysical properties and application of the relationships between porosity-permeability within the framework of hydraulic flow units is used to estimate permeability in un-cored wells. Techniques of flow unit or hydraulic flow unit (HFU) divided the reservoir into zones laterally and vertically which can be managed and control fluid flow within flow unit and considerably is entirely different with other flow units through reservoir. Each flow unit can be distinguished by applying the relationships of flow zone indicator (FZI) method. Supporting the relationship between porosity and permeability by using flow zone indictor is ca

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Improving Security of the Crypto-Stego Approach using Time Sequence Dictionary and Spacing Modification Techniques

Cryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o

... Show More
Crossref
View Publication Preview PDF